This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

OWASP Education Material Categorized

From OWASP
Revision as of 00:05, 22 July 2010 by Martinknobloch (talk | contribs) (Created page with '== Education Material Categorized == ==== Profession / Interest ==== Below you find the education material categorized by profession and interest. {| style="width:100%" border…')

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

Education Material Categorized

Profession / Interest

Below you find the education material categorized by profession and interest.

Management
Beginner
  • training material
Experienced
  • training material
Expert
  • training material
Student
Beginner
  • training material
Experienced
  • training material
Expert
  • training material
Developer
Beginner
  • training material
Experienced
  • training material
Expert
  • training material
Tester
Beginner
  • training material
Experienced
  • training material
Expert
  • training material


OWASP Top Ten

The OWASP Top Ten represents a broad consensus about what the most critical web application security flaws are. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. There are currently versions in English, French, Japanese, Korean and Turkish. A Spanish version is in the works. We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications do not contain these flaws. Adopting the OWASP Top Ten is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.

A1 - Cross Site Scripting (XSS)

Presentation
  • training material
Video's
  • training video

A2 - Injection Flaws

Presentation
  • training material
Video's
  • training video

A3 - Malicious File Execution

Presentation
  • training material
Video's
  • training video

A4 - Insecure Direct Object Reference

Presentation
  • training material
Video's
  • training video

A5 - Cross Site Request Forgery (CSRF)

Presentation
  • training material
Video's
  • training video

A6 - Information Leakage and Improper Error Handling

Presentation
  • training material
Video's
  • training video

A7 - Broken Authentication and Session Management

Presentation
  • training material
Video's
  • training video

A8 - Insecure Cryptographic Storage

Presentation
  • training material
Video's
  • training video

A9 - Insecure Communications

Presentation
  • training material
Video's
  • training video

A10 - Failure to Restrict URL Access

Presentation
  • training material
Video's
  • training video


OWASP Tooling

An OWASP Project is a collection of related tasks that have a defined roadmap and team members. OWASP project leaders are responsible for defining the vision, roadmap, and tasks for the project. The project leader also promotes the project and builds the team. Tools and documents are organized into the following categories: PROTECT - These are tools and documents that can be used to guard against security-related design and implementation flaws. DETECT - These are tools and documents that can be used to find security-related design and implementation flaws. LIFE CYCLE - These are tools and documents that can be used to add security-related activities into the Software Development Life Cycle (SDLC).



Protect:

OWASP AntiSamy Java Project

Beginner
  • training material
Experienced
  • training material
Expert
  • training material
Video's
  • training video

OWASP Enterprise Security API (ESAPI) Project

Beginner
  • training material
Experienced
  • training material
Expert
  • training material


Detect:

OWASP Live CD Project

Beginner
  • training material
Experienced
  • training material
Expert
  • training material

OWASP WebScarab Project

Beginner
  • training material
Experienced
  • training material
Expert
  • training material


Life Cycle:

OWASP WebGoat Project

Beginner
  • training material
Experienced
  • training material
Expert
  • training material


OWASP Documentation

An OWASP Project is a collection of related tasks that have a defined roadmap and team members. OWASP project leaders are responsible for defining the vision, roadmap, and tasks for the project. The project leader also promotes the project and builds the team. Tools and documents are organized into the following categories: PROTECT - These are tools and documents that can be used to guard against security-related design and implementation flaws. DETECT - These are tools and documents that can be used to find security-related design and implementation flaws. LIFE CYCLE - These are tools and documents that can be used to add security-related activities into the Software Development Life Cycle (SDLC).



Protect:

OWASP Development Guide

Beginner
  • training material
Experienced
  • training material
Expert
  • training material

OWASP Ruby on Rails Security Guide V2

Beginner
  • training material
Experienced
  • training material
Expert
  • training material



Detect:

OWASP Code Review Guide

Beginner
  • training material
Experienced
  • training material
Expert
  • training material

OWASP Testing Guide

Beginner
  • training material
Experienced
  • training material
Expert
  • training material

OOWASP Top Ten Project

Beginner
  • training material
Experienced
  • training material
Expert
  • training material


Life Cycle:

OWASP AppSec FAQ Project

Beginner
  • training material
Experienced
  • training material
Expert
  • training material

OWASP Legal Project

Beginner
  • training material
Experienced
  • training material
Expert
  • training material

OWASP Source Code Review for OWASP-Projects

Beginner
  • training material
Experienced
  • training material
Expert
  • training material


CLASP roles

CLASP (Comprehensive, Lightweight Application Security Process) provides a well-organized and structured approach for moving security concerns into the early stages of the software development lifecycle, whenever possible.

Architect
Beginner
  • training material
Experienced
  • training material
Expert
  • training material
Designer
Beginner
  • training material
Experienced
  • training material
Expert
  • training material
Implementer
Beginner
  • training material
Experienced
  • training material
Expert
  • training material
Project Manager
Beginner
  • training material
Experienced
  • training material
Expert
  • training material
Requirements Specifier
Beginner
  • training material
Experienced
  • training material
Expert
  • training material
Security Auditor
Beginner
  • training material
Experienced
  • training material
Expert
  • training material
Test Analyst
Beginner
  • training material
Experienced
  • training material
Expert
  • training material

SAMM Disciplines & Functions

Alignment & Governance
Education & Guidance
  • training material
Standards & Compliance
  • training material
Strategic Planning
  • training material
Requirements & Design
Threat Modeling
  • training material
Security Requirements
  • training material
Defensive Design
  • training material
Verification & Assessment
Architectuur Review
  • training material
Code Review
  • training material
Security Testing
  • training material
Deployment & Operations
Vulnerability Mangement
  • training material
Infrastrucxture Hardening
  • training material
Operational Enablement
  • beginner
  • mediate
  • expert
  • training material