Difference between revisions of "Category:OWASP Certification Requirements"

From OWASP
Jump to: navigation, search
(Content Area (Architect))
 
(13 intermediate revisions by 4 users not shown)
Line 1: Line 1:
== What should an exam feel like? ==
+
==What should an exam feel like?==
 
+
 
* Exams are proctored, timed, and delivered in a secure environment. Most exams last approximately two hours.  
 
* Exams are proctored, timed, and delivered in a secure environment. Most exams last approximately two hours.  
* Candidates must acknowledge the OWASP Certifications and Confidentiality Agreement online at the authorized testing center prior to taking any OWASP Certification exam. Candidates will not be able to proceed with the exam and a refund will not be provided. Signing this legal agreement is required to be officially certified.
+
* Candidates must acknowledge the OWASP Certification and Confidentiality Agreements online at the authorized testing center prior to taking any OWASP Certification exam. Candidates will not be able to proceed with the exam and a refund will not be provided. Signing this legal agreement is required to be officially certified.
 
* Exams can be very challenging, going beyond simple recall and requiring candidates to engage in on the job types of problem solving. Questions include multiple-choice single answer, multiple-choice multiple answers, drag and drop, fill in the blank and simulations.
 
* Exams can be very challenging, going beyond simple recall and requiring candidates to engage in on the job types of problem solving. Questions include multiple-choice single answer, multiple-choice multiple answers, drag and drop, fill in the blank and simulations.
 
* Exams other than final exams are delivered online, with questions in sequence, and do not allow a candidate to "mark" and return to an exam question.
 
* Exams other than final exams are delivered online, with questions in sequence, and do not allow a candidate to "mark" and return to an exam question.
Line 9: Line 8:
 
* At the completion of computer-based exams, candidates receive a score report along with a score breakout by exam section and the passing score for the given exam. For onsite proctored exams, candidates receive a score report along with a score breakout by exam section and the passing score for the given exam within ten business days.
 
* At the completion of computer-based exams, candidates receive a score report along with a score breakout by exam section and the passing score for the given exam. For onsite proctored exams, candidates receive a score report along with a score breakout by exam section and the passing score for the given exam within ten business days.
  
== Basic Information ==
+
==Basic Information==
 
+
 
{| style="width:100%" border="0" align="center"
 
{| style="width:100%" border="0" align="center"
 
  ! colspan="6" align="center" style="background:#4058A0; color:white"|<font color="white">'''OWASP Certification Project'''  
 
  ! colspan="6" align="center" style="background:#4058A0; color:white"|<font color="white">'''OWASP Certification Project'''  
Line 21: Line 19:
 
  |-
 
  |-
 
  | style="width:12%; background:#7B8ABD" align="center"|'''Email Contacts'''
 
  | style="width:12%; background:#7B8ABD" align="center"|'''Email Contacts'''
  | style="width:11%; background:#cccccc" align="center"|Project Leader<br>[mailto:owasp(at)jamesmcgovern.com '''James McGovern''']
+
  | style="width:11%; background:#cccccc" align="center"|Project Leader<br/>[mailto:owasp(at)jamesmcgovern.com '''James McGovern''']
  | style="width:11%; background:#cccccc" align="center"|First Exam<br>(BETA)<br>November 1st 2008'''
+
  | style="width:11%; background:#cccccc" align="center"|First Exam<br/>(BETA)<br/>November 1st 2008'''
  | style="width:11%; background:#cccccc" align="center"|Second Exam<br>(BETA)<br>February 1st 2009'''
+
  | style="width:11%; background:#cccccc" align="center"|Second Exam<br/>(BETA)<br/>February 1st 2009'''
  | style="width:11%; background:#cccccc" align="center"|Final Exam<br>(BETA)<br>March 1st 2009'''
+
  | style="width:11%; background:#cccccc" align="center"|Final Exam<br/>(BETA)<br/>March 1st 2009'''
  | style="width:11%; background:#cccccc" align="center"|Mailing List<br>[https://lists.owasp.org/mailman/listinfo/owasp-cert '''To subscribe''']<br>[mailto:owasp-cert@lists.owasp.org '''To use''']
+
  | style="width:11%; background:#cccccc" align="center"|Mailing List<br/>[https://lists.owasp.org/mailman/listinfo/owasp-cert '''To subscribe''']<br/>[mailto:owasp-cert@lists.owasp.org '''To use''']
 
  |}
 
  |}
  
== Learning Outcomes ==
+
==Learning Outcomes==
 
+
 
* Be concise. Each question should be one to two sentences
 
* Be concise. Each question should be one to two sentences
 
* Describe the behavior as a desired end product
 
* Describe the behavior as a desired end product
Line 37: Line 34:
  
 
Bad Examples...
 
Bad Examples...
 
 
# Develop accuracy (undefined trait)
 
# Develop accuracy (undefined trait)
 
# Know the rules for constructing essay tests (indefinite term)
 
# Know the rules for constructing essay tests (indefinite term)
Line 43: Line 39:
  
 
Good Examples...
 
Good Examples...
 
 
# Identifies the correct definition of terms
 
# Identifies the correct definition of terms
 
# Mount a USB key drive
 
# Mount a USB key drive
 
# Schedule a cron job
 
# Schedule a cron job
  
== Bloom's Taxonomy of Educational Objectives ==
+
==Bloom's Taxonomy of Educational Objectives==
 
+
 
* '''KNOWLEDGE''' (remembering previously learned material)
 
* '''KNOWLEDGE''' (remembering previously learned material)
 
** Knowledge of specifics
 
** Knowledge of specifics
** Knowledge of terms
+
*** Knowledge of terms
** Knowledge of specific facts
+
*** Knowledge of specific facts
* Knowledge of ways and means of dealing with specifics
+
** Knowledge of ways and means of dealing with specifics
** Knowledge of conventions
+
*** Knowledge of conventions
** Knowledge of trends and sequences
+
*** Knowledge of trends and sequences
** Knowledge of classifications and categories
+
*** Knowledge of classifications and categories
** Knowledge of criteria
+
*** Knowledge of criteria
** Knowledge of methodology
+
*** Knowledge of methodology
* Knowledge of the universals and abstractions
+
** Knowledge of the universals and abstractions
** Knowledge of principles and generalizations
+
*** Knowledge of principles and generalizations
 
* '''COMPREHENSION''' (grasping the meaning of the material)
 
* '''COMPREHENSION''' (grasping the meaning of the material)
 
** Translation (converting one form to another)
 
** Translation (converting one form to another)
Line 75: Line 69:
 
*** Judgments in terms of external criteria
 
*** Judgments in terms of external criteria
  
== Content Area (Developer) ==
+
==Content Area (Developer/Apprentice/Associate)==
 
+
 
{| style="width:100%" border="0" align="center"
 
{| style="width:100%" border="0" align="center"
  ! colspan="4" align="center" style="background:#4058A0; color:white"|<font color="white">'''Exam One - Apprentice'''  
+
  ! colspan="4" align="center" style="background:#4058A0; color:white"|<font color="white">'''Exam One - Developer/Apprentice'''  
 
  |-
 
  |-
 
  | style="width:12%; background:#deeede" align="center"|'''Subject Area'''
 
  | style="width:12%; background:#deeede" align="center"|'''Subject Area'''
  | style="width:11%; background:#deeede" align="center"|'''Questions<br>(Target Count)'''
+
  | style="width:11%; background:#deeede" align="center"|'''Questions<br/>(Target Count)'''
  | style="width:11%; background:#deeede" align="center"|'''Content Owner<br>(Primary)'''
+
  | style="width:11%; background:#deeede" align="center"|'''Content Owner<br/>(Primary)'''
 
  | style="width:11%; background:#deeede" align="center"|'''Content Reviewers'''
 
  | style="width:11%; background:#deeede" align="center"|'''Content Reviewers'''
 
  |-
 
  |-
 
  | style="width:12%; background:#cccccc" align="center"|Basic Security Principles'''
 
  | style="width:12%; background:#cccccc" align="center"|Basic Security Principles'''
  | style="width:11%; background:#cccccc" align="center"|30 to 40'''
+
  | style="width:11%; background:#cccccc" align="center"|40 to 50'''
  | style="width:11%; background:#cccccc" align="center"|[mailto:owasp(at)jamesmcgovern.com '''James McGovern''']
+
  | style="width:11%; background:#cccccc" align="center"|[mailto:owasp(at)jamesmcgovern.com '''James McGovern''']<br/>[mailto:matthew.chalmers(at)owasp.org '''Matthew Chalmers''']
  | style="width:11%; background:#cccccc" align="center"|TBD'''
+
  | style="width:11%; background:#cccccc" align="center"|[mailto:sil(at)infiltrated.net '''J. Oquendo''']<br/>[mailto:paul.biciunas(at)fmr.com '''Paul Biciunas''']
 
  |-
 
  |-
 
  | style="width:12%; background:#deeede" align="center"|OWASP Top Ten'''
 
  | style="width:12%; background:#deeede" align="center"|OWASP Top Ten'''
 
  | style="width:11%; background:#deeede" align="center"|10 to 20'''
 
  | style="width:11%; background:#deeede" align="center"|10 to 20'''
 
  | style="width:11%; background:#deeede" align="center"|[mailto:chw(at)hauser-wenz.de '''Christian Wenz''']
 
  | style="width:11%; background:#deeede" align="center"|[mailto:chw(at)hauser-wenz.de '''Christian Wenz''']
  | style="width:11%; background:#deeede" align="center"|TBD'''
+
  | style="width:11%; background:#deeede" align="center"|[mailto:matthew.chalmers(at)owasp.org '''Matthew Chalmers''']
 
  |-
 
  |-
 
  | style="width:12%; background:#cccccc" align="center"|Penetration Testing'''
 
  | style="width:12%; background:#cccccc" align="center"|Penetration Testing'''
 
  | style="width:11%; background:#cccccc" align="center"|30 to 40'''
 
  | style="width:11%; background:#cccccc" align="center"|30 to 40'''
  | style="width:11%; background:#cccccc" align="center"|TBD'''
+
  | style="width:11%; background:#cccccc" align="center"|[mailto:sil(at)infiltrated.net '''J. Oquendo''']<br/>[mailto:matthew.chalmers(at)owasp.org '''Matthew Chalmers''']
  | style="width:11%; background:#cccccc" align="center"|TBD'''
+
  | style="width:11%; background:#cccccc" align="center"|[mailto:joshbw(at)analyticalengine.net '''Josh Brown-White''']<br/>[mailto:bpankey(at)gmail.com '''Bill Pankey''']
 
  |-
 
  |-
 
  | style="width:12%; background:#deeede" align="center"|Code Review'''
 
  | style="width:12%; background:#deeede" align="center"|Code Review'''
 
  | style="width:11%; background:#deeede" align="center"|20 to 30'''
 
  | style="width:11%; background:#deeede" align="center"|20 to 30'''
 
  | style="width:11%; background:#deeede" align="center"|TBD'''
 
  | style="width:11%; background:#deeede" align="center"|TBD'''
  | style="width:11%; background:#deeede" align="center"|TBD'''
+
  | style="width:11%; background:#deeede" align="center"|[mailto:njama(at)owasp.org '''Mario de Boer''']<br/>[mailto:andrews(at)rbacomm.com '''Brad Andrews''']
 
  |-
 
  |-
 
  | style="width:12%; background:#cccccc" align="center"|Logging'''
 
  | style="width:12%; background:#cccccc" align="center"|Logging'''
 
  | style="width:11%; background:#cccccc" align="center"|10 to 20'''
 
  | style="width:11%; background:#cccccc" align="center"|10 to 20'''
| style="width:11%; background:#cccccc" align="center"|[mailto:owasp(at)jamesmcgovern.com '''James McGovern''']
 
 
  | style="width:11%; background:#cccccc" align="center"|TBD'''
 
  | style="width:11%; background:#cccccc" align="center"|TBD'''
 +
| style="width:11%; background:#cccccc" align="center"|[mailto:matthew.chalmers(at)owasp.org '''Matthew Chalmers''']<br>[mailto:namn(at)bluemoon.com.vn '''Nam Nguyen''']
 
  |-
 
  |-
 
  | style="width:12%; background:#deeede" align="center"|Software Design Patterns'''
 
  | style="width:12%; background:#deeede" align="center"|Software Design Patterns'''
 
  | style="width:11%; background:#deeede" align="center"|10 to 15'''
 
  | style="width:11%; background:#deeede" align="center"|10 to 15'''
 
  | style="width:11%; background:#deeede" align="center"|TBD'''
 
  | style="width:11%; background:#deeede" align="center"|TBD'''
  | style="width:11%; background:#deeede" align="center"|TBD'''
+
  | style="width:11%; background:#deeede" align="center"|[mailto:andreas.opdahl(at)uib.no '''Andreas L. Opdahl''']
 
  |-
 
  |-
 
  | style="width:12%; background:#cccccc" align="center"|Network Security'''
 
  | style="width:12%; background:#cccccc" align="center"|Network Security'''
 
  | style="width:11%; background:#cccccc" align="center"|30 to 40'''
 
  | style="width:11%; background:#cccccc" align="center"|30 to 40'''
 
  | style="width:11%; background:#cccccc" align="center"|[mailto:owasp(at)jamesmcgovern.com '''James McGovern''']
 
  | style="width:11%; background:#cccccc" align="center"|[mailto:owasp(at)jamesmcgovern.com '''James McGovern''']
  | style="width:11%; background:#cccccc" align="center"|TBD'''
+
  | style="width:11%; background:#cccccc" align="center"|[mailto:njama(at)owasp.org '''Mario de Boer''']<br/>[mailto:sil(at)infiltrated.net '''J. Oquendo''']
 
  |-
 
  |-
 
  | style="width:12%; background:#deeede" align="center"|XML'''
 
  | style="width:12%; background:#deeede" align="center"|XML'''
 
  | style="width:11%; background:#deeede" align="center"|20 to 30'''
 
  | style="width:11%; background:#deeede" align="center"|20 to 30'''
 
  | style="width:11%; background:#deeede" align="center"|TBD'''
 
  | style="width:11%; background:#deeede" align="center"|TBD'''
  | style="width:11%; background:#deeede" align="center"|TBD'''
+
  | style="width:11%; background:#deeede" align="center"|[mailto:owasp(at)jamesmcgovern.com '''James McGovern''']
 
  |-
 
  |-
 
  | style="width:12%; background:#cccccc" align="center"|Cryptography'''
 
  | style="width:12%; background:#cccccc" align="center"|Cryptography'''
 
  | style="width:11%; background:#cccccc" align="center"|10 to 15'''
 
  | style="width:11%; background:#cccccc" align="center"|10 to 15'''
  | style="width:11%; background:#cccccc" align="center"|TBD'''
+
  | style="width:11%; background:#cccccc" align="center"|[mailto:matthew.chalmers(at)owasp.org '''Matthew Chalmers''']<br/>[mailto:njama(at)owasp.org '''Mario de Boer''']
  | style="width:11%; background:#cccccc" align="center"|TBD'''
+
  | style="width:11%; background:#cccccc" align="center"|[mailto:paul.biciunas(at)fmr.com '''Paul Biciunas''']<br>[mailto:owasp(at)jamesmcgovern.com '''James McGovern''']
 
  |-
 
  |-
 
  | style="width:12%; background:#deeede" align="center"|Software Testing'''
 
  | style="width:12%; background:#deeede" align="center"|Software Testing'''
 
  | style="width:11%; background:#deeede" align="center"|20 to 30'''
 
  | style="width:11%; background:#deeede" align="center"|20 to 30'''
 
  | style="width:11%; background:#deeede" align="center"|TBD'''
 
  | style="width:11%; background:#deeede" align="center"|TBD'''
  | style="width:11%; background:#deeede" align="center"|TBD'''
+
  | style="width:11%; background:#deeede" align="center"|[mailto:owasp(at)jamesmcgovern.com '''James McGovern''']
 
  |-
 
  |-
 
  | style="width:12%; background:#cccccc" align="center"|Threats and Vulnerabilities'''
 
  | style="width:12%; background:#cccccc" align="center"|Threats and Vulnerabilities'''
 
  | style="width:11%; background:#cccccc" align="center"|30 to 40'''
 
  | style="width:11%; background:#cccccc" align="center"|30 to 40'''
  | style="width:11%; background:#cccccc" align="center"|[mailto:chw(at)hauser-wenz.de '''Christian Wenz''']
+
  | style="width:11%; background:#cccccc" align="center"|[mailto:chw(at)hauser-wenz.de '''Christian Wenz''']<br/>[mailto:sil(at)infiltrated.net '''J. Oquendo''']
| style="width:11%; background:#cccccc" align="center"|TBD'''
+
  | style="width:11%; background:#cccccc" align="center"|[mailto:andreas.opdahl(at)uib.no '''Andreas L. Opdahl''']<br/>[mailto:joshbw(at)analyticalengine.net '''Josh Brown-White''']
|-
+
| style="width:12%; background:#deeede" align="center"|Language Specific'''
+
  | style="width:11%; background:#deeede" align="center"|20 to 30'''
+
| style="width:11%; background:#deeede" align="center"|TBD'''
+
| style="width:11%; background:#deeede" align="center"|TBD'''
+
 
  |-
 
  |-
 
  | style="width:12%; background:#cccccc" align="center"|Databases'''
 
  | style="width:12%; background:#cccccc" align="center"|Databases'''
 
  | style="width:11%; background:#cccccc" align="center"|10 to 15'''
 
  | style="width:11%; background:#cccccc" align="center"|10 to 15'''
 
  | style="width:11%; background:#cccccc" align="center"|[mailto:chw(at)hauser-wenz.de '''Christian Wenz''']
 
  | style="width:11%; background:#cccccc" align="center"|[mailto:chw(at)hauser-wenz.de '''Christian Wenz''']
  | style="width:11%; background:#cccccc" align="center"|TBD'''
+
  | style="width:11%; background:#cccccc" align="center"|[mailto:namn(at)bluemoon.com.vn '''Nam Nguyen''']
|-
+
|}
| style="width:12%; background:#deeede" align="center"|Configuration and Release Management'''
+
<br/>
| style="width:11%; background:#deeede" align="center"|30 to 40'''
+
| style="width:11%; background:#deeede" align="center"|TBD'''
+
| style="width:11%; background:#deeede" align="center"|TBD'''
+
|}
+
<br>
+
== Content Area (Architect) ==
+
  
 +
==Content Area (Architect/Journeyman/Professional)==
 
{| style="width:100%" border="0" align="center"
 
{| style="width:100%" border="0" align="center"
  ! colspan="4" align="center" style="background:#4058A0; color:white"|<font color="white">'''Exam Two - Journeyman'''  
+
  ! colspan="4" align="center" style="background:#4058A0; color:white"|<font color="white">'''Exam Two - Architect/Journeyman'''  
 
  |-
 
  |-
 
  | style="width:12%; background:#deeede" align="center"|'''Subject Area'''
 
  | style="width:12%; background:#deeede" align="center"|'''Subject Area'''
  | style="width:11%; background:#deeede" align="center"|'''Questions<br>(Target Count)'''
+
  | style="width:11%; background:#deeede" align="center"|'''Questions<br/>(Target Count)'''
  | style="width:11%; background:#deeede" align="center"|'''Content Owner<br>(Primary)'''
+
  | style="width:11%; background:#deeede" align="center"|'''Content Owner<br/>(Primary)'''
 
  | style="width:11%; background:#deeede" align="center"|'''Content Reviewers'''
 
  | style="width:11%; background:#deeede" align="center"|'''Content Reviewers'''
 
  |-
 
  |-
 
  | style="width:12%; background:#cccccc" align="center"|SDLC'''
 
  | style="width:12%; background:#cccccc" align="center"|SDLC'''
 
  | style="width:11%; background:#cccccc" align="center"|30 to 40'''
 
  | style="width:11%; background:#cccccc" align="center"|30 to 40'''
  | style="width:11%; background:#cccccc" align="center"|TBD'''
+
  | style="width:11%; background:#cccccc" align="center"|[mailto:matthew.chalmers(at)owasp.org '''Matthew Chalmers''']
  | style="width:11%; background:#cccccc" align="center"|[mailto:avs(at)iki.fi '''Antti Vähä-Sipilä''']
+
  | style="width:11%; background:#cccccc" align="center"|[mailto:avs(at)iki.fi '''Antti Vähä-Sipilä''']<br/>[mailto:andreas.opdahl(at)uib.no '''Andreas L. Opdahl''']
 
  |-
 
  |-
 
  | style="width:12%; background:#deeede" align="center"|Information Security Policies'''
 
  | style="width:12%; background:#deeede" align="center"|Information Security Policies'''
 
  | style="width:11%; background:#deeede" align="center"|10 to 20'''
 
  | style="width:11%; background:#deeede" align="center"|10 to 20'''
  | style="width:11%; background:#deeede" align="center"|TBD'''
+
  | style="width:11%; background:#deeede" align="center"|[mailto:sil(at)infiltrated.net '''J. Oquendo''']
  | style="width:11%; background:#deeede" align="center"|TBD'''
+
  | style="width:11%; background:#deeede" align="center"|[mailto:andreas.opdahl(at)uib.no '''Andreas L. Opdahl''']<br/>[mailto:matthew.chalmers(at)owasp.org '''Matthew Chalmers''']
 
  |-
 
  |-
 
  | style="width:12%; background:#cccccc" align="center"|Software Architecture'''
 
  | style="width:12%; background:#cccccc" align="center"|Software Architecture'''
Line 183: Line 166:
 
  | style="width:12%; background:#deeede" align="center"|Economics'''
 
  | style="width:12%; background:#deeede" align="center"|Economics'''
 
  | style="width:11%; background:#deeede" align="center"|20 to 30'''
 
  | style="width:11%; background:#deeede" align="center"|20 to 30'''
  | style="width:11%; background:#deeede" align="center"|James McGovern'''
+
  | style="width:11%; background:#deeede" align="center"|[mailto:owasp(at)jamesmcgovern.com '''James McGovern''']
  | style="width:11%; background:#deeede" align="center"|TBD'''
+
  | style="width:11%; background:#deeede" align="center"|[mailto:wmackey(at)comcast.net '''Wade Mackey''']
 
  |-
 
  |-
 
  | style="width:12%; background:#cccccc" align="center"|Requirements and Analysis'''
 
  | style="width:12%; background:#cccccc" align="center"|Requirements and Analysis'''
 
  | style="width:11%; background:#cccccc" align="center"|10 to 20'''
 
  | style="width:11%; background:#cccccc" align="center"|10 to 20'''
  | style="width:11%; background:#cccccc" align="center"|James McGovern'''
+
  | style="width:11%; background:#cccccc" align="center"|[mailto:matthew.chalmers(at)owasp.org '''Matthew Chalmers''']
  | style="width:11%; background:#cccccc" align="center"|TBD'''
+
  | style="width:11%; background:#cccccc" align="center"|[mailto:andreas.opdahl(at)uib.no '''Andreas L. Opdahl''']<br>[mailto:wmackey(at)comcast.net '''Wade Mackey''']
 
  |-
 
  |-
 
  | style="width:12%; background:#deeede" align="center"|Strategy'''
 
  | style="width:12%; background:#deeede" align="center"|Strategy'''
 
  | style="width:11%; background:#deeede" align="center"|10 to 15'''
 
  | style="width:11%; background:#deeede" align="center"|10 to 15'''
  | style="width:11%; background:#deeede" align="center"|TBD'''
+
  | style="width:11%; background:#deeede" align="center"|[mailto:wmackey(at)comcast.net '''Wade Mackey''']
 
  | style="width:11%; background:#deeede" align="center"|TBD'''
 
  | style="width:11%; background:#deeede" align="center"|TBD'''
 
  |-
 
  |-
Line 199: Line 182:
 
  | style="width:11%; background:#cccccc" align="center"|30 to 40'''
 
  | style="width:11%; background:#cccccc" align="center"|30 to 40'''
 
  | style="width:11%; background:#cccccc" align="center"|Gunnar Peterson'''
 
  | style="width:11%; background:#cccccc" align="center"|Gunnar Peterson'''
  | style="width:11%; background:#cccccc" align="center"|TBD'''
+
  | style="width:11%; background:#cccccc" align="center"|[mailto:andreas.opdahl(at)uib.no '''Andreas L. Opdahl''']
 
  |-
 
  |-
 
  | style="width:12%; background:#deeede" align="center"|Identity Management'''
 
  | style="width:12%; background:#deeede" align="center"|Identity Management'''
 
  | style="width:11%; background:#deeede" align="center"|20 to 30'''
 
  | style="width:11%; background:#deeede" align="center"|20 to 30'''
  | style="width:11%; background:#deeede" align="center"|TBD'''
+
  | style="width:11%; background:#deeede" align="center"|[mailto:paul.biciunas(at)fmr.com '''Paul Biciunas''']
  | style="width:11%; background:#deeede" align="center"|TBD'''
+
  | style="width:11%; background:#deeede" align="center"|[mailto:bpankey(at)gmail.com '''Bill Pankey''']'''
 
  |-
 
  |-
 
  | style="width:12%; background:#cccccc" align="center"|Entitlements Management'''
 
  | style="width:12%; background:#cccccc" align="center"|Entitlements Management'''
 
  | style="width:11%; background:#cccccc" align="center"|10 to 15'''
 
  | style="width:11%; background:#cccccc" align="center"|10 to 15'''
  | style="width:11%; background:#cccccc" align="center"|James McGovern'''
+
  | style="width:11%; background:#cccccc" align="center"|[mailto:owasp(at)jamesmcgovern.com '''James McGovern''']
 
  | style="width:11%; background:#cccccc" align="center"|TBD'''
 
  | style="width:11%; background:#cccccc" align="center"|TBD'''
 
  |-
 
  |-
 
  | style="width:12%; background:#deeede" align="center"|Privacy'''
 
  | style="width:12%; background:#deeede" align="center"|Privacy'''
 
  | style="width:11%; background:#deeede" align="center"|20 to 30'''
 
  | style="width:11%; background:#deeede" align="center"|20 to 30'''
  | style="width:11%; background:#deeede" align="center"|TBD'''
+
  | style="width:11%; background:#deeede" align="center"|[mailto:bpankey(at)gmail.com '''Bill Pankey''']'''
 
  | style="width:11%; background:#deeede" align="center"|[mailto:avs(at)iki.fi '''Antti Vähä-Sipilä''']
 
  | style="width:11%; background:#deeede" align="center"|[mailto:avs(at)iki.fi '''Antti Vähä-Sipilä''']
 
  |}
 
  |}
  
== Content Area (Master) ==
+
==Content Area (Master)==
 
+
 
The third exam will be a written essay or presentation on a topic deemed appropriate by the OWASP board. The deciding criteria will be determined by OWASP chapter leaders. Each chapter leader will receive one vote. The OWASP Certification Project Leader also gets one vote and subject area contributors also will receive one vote. If people play both roles, then they are permitted two votes. In order to pass, a candidate must receive more positive votes than negative.
 
The third exam will be a written essay or presentation on a topic deemed appropriate by the OWASP board. The deciding criteria will be determined by OWASP chapter leaders. Each chapter leader will receive one vote. The OWASP Certification Project Leader also gets one vote and subject area contributors also will receive one vote. If people play both roles, then they are permitted two votes. In order to pass, a candidate must receive more positive votes than negative.
  
== Exam Details ==
+
==Exam Details==
 
+
 
* The first exam will consist of 100 to 120 questions (random) where the format can include:
 
* The first exam will consist of 100 to 120 questions (random) where the format can include:
 
** Multiple-choice single answer
 
** Multiple-choice single answer
Line 238: Line 219:
 
Passing scores are set by using statistical analysis and are subject to change. At the completion of the exam, candidates receive a score report along with a score breakout by exam section and the passing score for the given exam. OWASP does not publish exam passing scores because exam questions and passing scores are subject to change without notice.
 
Passing scores are set by using statistical analysis and are subject to change. At the completion of the exam, candidates receive a score report along with a score breakout by exam section and the passing score for the given exam. OWASP does not publish exam passing scores because exam questions and passing scores are subject to change without notice.
  
== Branding ==
+
==Branding==
 
+
You will notice that we have not landed on the branding aspects around each certification level. The headings reflect much of our current thinking. We will put out a survey to OWASP membership regarding branding aspects after we have completed item development.
You will notice that we have not landed on the branding aspects around each certification level. Below are some of our ideas:
+
* Developer, Architect, Master
+
* Associate, Professional, Expert
+
* Apprentice, Journeyman, Master
+
  
 
In terms of names of the certification, we are currently exploring:
 
In terms of names of the certification, we are currently exploring:
* Certified Application Security (above)
+
* Certified (Web) Application Security ''(level, above)''
 +
* Certified (Web) Application Security Professional/Practitioner
 +
* OWASP Web Application Security Professional/Practitioner
 +
** [http://en.wikipedia.org/wiki/Recursive_acronym Recursive acronym]
 +
** Identical to ''OWASP'' which could be confusing
  
== Policies ==
+
==Policies==
 
+
All content, specifically questions, answers and diagrams of the certification exams are the proprietary and confidential property of OWASP. They may not be copied, reproduced, modified, published, uploaded, posted, transmitted, or distributed in any way without the express written authorization of OWASP. Candidates who sit for OWASP exams must agree they have read and will abide by the terms and conditions of the OWASP Certification and Confidentiality Agreements before beginning the certification exam. The agreement applies to all exams. Signing and adhering to this agreement is required to be officially certified and to maintain valid certification.
All content, specifically questions, answers and diagrams of the certification exams are the proprietary and confidential property of OWASP. They may not be copied, reproduced, modified, published, uploaded, posted, transmitted, or distributed in anyway without the express authorization of OWASP. Candidates who sit for OWASP exams must agree they have read and will abide by the terms and conditions of the OWASP Certifications and Confidentiality Agreement before beginning the certification exam. The agreement applies to all exams. Signing and adhering to this agreement is required to be officially certified and to maintain valid certification.
+
 
+
== Conduct ==
+
  
 +
==Conduct==
 
Candidates must take no action to compromise the integrity or confidentiality of any OWASP certification exam or certification program. Penalties for violating the policy can include up to and including a lifetime ban on all future exams and the nullification of all previous certifications.
 
Candidates must take no action to compromise the integrity or confidentiality of any OWASP certification exam or certification program. Penalties for violating the policy can include up to and including a lifetime ban on all future exams and the nullification of all previous certifications.
  
== Correspondence ==
+
==Correspondence==
 
+
 
All official correspondence to certified candidates is sent to the email and/or address recorded in the OWASP Certifications Tracking System. Candidates are responsible for updating their personal information in the Tracking System to ensure receipt of official correspondence.  
 
All official correspondence to certified candidates is sent to the email and/or address recorded in the OWASP Certifications Tracking System. Candidates are responsible for updating their personal information in the Tracking System to ensure receipt of official correspondence.  
  
== Other Disclaimers ==  
+
==Other Disclaimers==
 
+
 
* The target count for questions is the number of desired questions that are part of the exam question pool at any one time. Over time, questions will be expired and new ones will be added. The pool of questions created by the project team should be double the indicated target count.
 
* The target count for questions is the number of desired questions that are part of the exam question pool at any one time. Over time, questions will be expired and new ones will be added. The pool of questions created by the project team should be double the indicated target count.
 
* Each subject area will have two reviewers of which the project manager may agree to be one.  
 
* Each subject area will have two reviewers of which the project manager may agree to be one.  

Latest revision as of 06:12, 5 August 2008

Contents

What should an exam feel like?

  • Exams are proctored, timed, and delivered in a secure environment. Most exams last approximately two hours.
  • Candidates must acknowledge the OWASP Certification and Confidentiality Agreements online at the authorized testing center prior to taking any OWASP Certification exam. Candidates will not be able to proceed with the exam and a refund will not be provided. Signing this legal agreement is required to be officially certified.
  • Exams can be very challenging, going beyond simple recall and requiring candidates to engage in on the job types of problem solving. Questions include multiple-choice single answer, multiple-choice multiple answers, drag and drop, fill in the blank and simulations.
  • Exams other than final exams are delivered online, with questions in sequence, and do not allow a candidate to "mark" and return to an exam question.
  • Candidates will be provided with an erasable note board and marker for notes and calculations to assist them as they answer the questions.
  • Exams may contain non-scored items to collect performance data on new items. Non-scored items are not used in determining the passing score nor are reported in a subsection of the score report. All non-scored items are randomly placed in the exam with sufficient time calculated and given to complete the entire exam.
  • At the completion of computer-based exams, candidates receive a score report along with a score breakout by exam section and the passing score for the given exam. For onsite proctored exams, candidates receive a score report along with a score breakout by exam section and the passing score for the given exam within ten business days.

Basic Information

OWASP Certification Project
Project Name OWASP Certification Requirements
Summary This document outlines the basic requirements around the exam portion of certification. Separate pages will be created to discuss marketing, dispute resolution, study aids and other aspects.
Email Contacts Project Leader
James McGovern
First Exam
(BETA)
November 1st 2008
Second Exam
(BETA)
February 1st 2009
Final Exam
(BETA)
March 1st 2009
Mailing List
To subscribe
To use

Learning Outcomes

  • Be concise. Each question should be one to two sentences
  • Describe the behavior as a desired end product
  • Focus on observable behaviors only
  • Use definite terms (write, define, list, identify, predict, select, etc)
  • Avoid vague terms (learn, see, realize, develop, understand, apply, etc.)

Bad Examples...

  1. Develop accuracy (undefined trait)
  2. Know the rules for constructing essay tests (indefinite term)
  3. Define and calculate the mean and explain its uses (multiple behaviors)

Good Examples...

  1. Identifies the correct definition of terms
  2. Mount a USB key drive
  3. Schedule a cron job

Bloom's Taxonomy of Educational Objectives

  • KNOWLEDGE (remembering previously learned material)
    • Knowledge of specifics
      • Knowledge of terms
      • Knowledge of specific facts
    • Knowledge of ways and means of dealing with specifics
      • Knowledge of conventions
      • Knowledge of trends and sequences
      • Knowledge of classifications and categories
      • Knowledge of criteria
      • Knowledge of methodology
    • Knowledge of the universals and abstractions
      • Knowledge of principles and generalizations
  • COMPREHENSION (grasping the meaning of the material)
    • Translation (converting one form to another)
    • Interpretation (explaining or summarizing material)
    • Extrapolation (extending meaning beyond the data)
  • APPLICATION (using info in concrete situations)
    • Analysis (Breaking down material into its parts)
      • Analysis of elements (identifying the parts)
      • Analysis of relationships
      • Analysis of organizational principles (identifying the way parts are organizaned)
    • Evaluation (judging value of a thing using definite criteria)
      • Judgments in terms of internal evidence
      • Judgments in terms of external criteria

Content Area (Developer/Apprentice/Associate)

Exam One - Developer/Apprentice
Subject Area Questions
(Target Count)
Content Owner
(Primary)
Content Reviewers
Basic Security Principles 40 to 50 James McGovern
Matthew Chalmers
J. Oquendo
Paul Biciunas
OWASP Top Ten 10 to 20 Christian Wenz Matthew Chalmers
Penetration Testing 30 to 40 J. Oquendo
Matthew Chalmers
Josh Brown-White
Bill Pankey
Code Review 20 to 30 TBD Mario de Boer
Brad Andrews
Logging 10 to 20 TBD Matthew Chalmers
Nam Nguyen
Software Design Patterns 10 to 15 TBD Andreas L. Opdahl
Network Security 30 to 40 James McGovern Mario de Boer
J. Oquendo
XML 20 to 30 TBD James McGovern
Cryptography 10 to 15 Matthew Chalmers
Mario de Boer
Paul Biciunas
James McGovern
Software Testing 20 to 30 TBD James McGovern
Threats and Vulnerabilities 30 to 40 Christian Wenz
J. Oquendo
Andreas L. Opdahl
Josh Brown-White
Databases 10 to 15 Christian Wenz Nam Nguyen


Content Area (Architect/Journeyman/Professional)

Exam Two - Architect/Journeyman
Subject Area Questions
(Target Count)
Content Owner
(Primary)
Content Reviewers
SDLC 30 to 40 Matthew Chalmers Antti Vähä-Sipilä
Andreas L. Opdahl
Information Security Policies 10 to 20 J. Oquendo Andreas L. Opdahl
Matthew Chalmers
Software Architecture 30 to 40 TBD TBD
Economics 20 to 30 James McGovern Wade Mackey
Requirements and Analysis 10 to 20 Matthew Chalmers Andreas L. Opdahl
Wade Mackey
Strategy 10 to 15 Wade Mackey TBD
SOA 30 to 40 Gunnar Peterson Andreas L. Opdahl
Identity Management 20 to 30 Paul Biciunas Bill Pankey
Entitlements Management 10 to 15 James McGovern TBD
Privacy 20 to 30 Bill Pankey Antti Vähä-Sipilä

Content Area (Master)

The third exam will be a written essay or presentation on a topic deemed appropriate by the OWASP board. The deciding criteria will be determined by OWASP chapter leaders. Each chapter leader will receive one vote. The OWASP Certification Project Leader also gets one vote and subject area contributors also will receive one vote. If people play both roles, then they are permitted two votes. In order to pass, a candidate must receive more positive votes than negative.

Exam Details

  • The first exam will consist of 100 to 120 questions (random) where the format can include:
    • Multiple-choice single answer
    • Multiple-choice multiple answer
    • Drag-and-drop
    • Fill-in-the-blank
    • Testlet
    • Simlet
    • Simulations
  • Before taking the exam, candidates should become familiar with how all exam types function-especially the testlet, simlet, and the simulation tool. Such practice will allow candidates to focus their exam-taking efforts on the exam questions rather than on how to correctly use the tools.
  • Candidates may only take a beta exam once.
  • Candidates who fail an exam must wait a period of ninety (90) calendar days, beginning the day after the failed attempt, before they may retest for the same exam.
  • Once passed, a candidate must wait a minimum of 180 days before taking the same exam with an identical exam number.

Passing scores are set by using statistical analysis and are subject to change. At the completion of the exam, candidates receive a score report along with a score breakout by exam section and the passing score for the given exam. OWASP does not publish exam passing scores because exam questions and passing scores are subject to change without notice.

Branding

You will notice that we have not landed on the branding aspects around each certification level. The headings reflect much of our current thinking. We will put out a survey to OWASP membership regarding branding aspects after we have completed item development.

In terms of names of the certification, we are currently exploring:

  • Certified (Web) Application Security (level, above)
  • Certified (Web) Application Security Professional/Practitioner
  • OWASP Web Application Security Professional/Practitioner

Policies

All content, specifically questions, answers and diagrams of the certification exams are the proprietary and confidential property of OWASP. They may not be copied, reproduced, modified, published, uploaded, posted, transmitted, or distributed in any way without the express written authorization of OWASP. Candidates who sit for OWASP exams must agree they have read and will abide by the terms and conditions of the OWASP Certification and Confidentiality Agreements before beginning the certification exam. The agreement applies to all exams. Signing and adhering to this agreement is required to be officially certified and to maintain valid certification.

Conduct

Candidates must take no action to compromise the integrity or confidentiality of any OWASP certification exam or certification program. Penalties for violating the policy can include up to and including a lifetime ban on all future exams and the nullification of all previous certifications.

Correspondence

All official correspondence to certified candidates is sent to the email and/or address recorded in the OWASP Certifications Tracking System. Candidates are responsible for updating their personal information in the Tracking System to ensure receipt of official correspondence.

Other Disclaimers

  • The target count for questions is the number of desired questions that are part of the exam question pool at any one time. Over time, questions will be expired and new ones will be added. The pool of questions created by the project team should be double the indicated target count.
  • Each subject area will have two reviewers of which the project manager may agree to be one.
  • The indicated target count should not be construed as to the number of questions that will be asked in any given exam. This will be determined based on psychometric analysis and/or other factors including but not limited to:
    • Analysis of statistics provided by initial OWASP Certification Survey
    • Detection of exam cheating (e.g. collusion, fraud, etc) by test takers
    • Feedback received from beta test takers
    • Adjustments to the exam to target first time test taker failure rate
  • The Project Leader and members of the OWASP board will be the only entities that will ever see the entire question set
  • No exam test taker, their employers or potential employers should assume that those who pass are suitable for any particular purpose, only that they have demonstrated sufficient knowledge of the subject areas covered by the exam
  • OWASP reserves the right to revoke certification of test takers who have been validated as cheats on other IT certifications

OWASP respects your privacy and is committed to protect the personal information that you share with us. The OWASP Privacy Policy describes how we collect and use your personal information.

  • OWASP reserves the right to publish the names and full contact information of any individual or party who compromises the validity of the certification process

This category currently contains no pages or media.