Difference between revisions of "OWASP Education"

From OWASP
Jump to: navigation, search
Line 35: Line 35:
 
|[[http://www.owasp.org/images/7/74/Advanced_SQL_Injection.ppt Advanced SQL Injection (Victor Chapela)] || Detailed methodology for analyzing applications for SQL injection vulnerabilities || Expert|| 9
 
|[[http://www.owasp.org/images/7/74/Advanced_SQL_Injection.ppt Advanced SQL Injection (Victor Chapela)] || Detailed methodology for analyzing applications for SQL injection vulnerabilities || Expert|| 9
 
|-valign="top"
 
|-valign="top"
|[[http://www.owasp.org/images/7/7d/Advanced_Topics_on_SQL_Injection_Protection.ppt (Sam NG)] || 7 methods to prevent SQL injection attacks correctly and in a more integrated approach. Methods 1 to 3 are applicable during design or development life cycle. Method 4 is mainly from QA’s perspective. Methods 5 and 6 can be applied to production environment and are applicable even if you do not have access to or if you cannot change the source code. Other non-main stream technology are discussed in Method 7.  || Intermediate|| 8
+
|[[http://www.owasp.org/images/7/7d/Advanced_Topics_on_SQL_Injection_Protection.ppt Advanced Topics on SQL Injection Protection (Sam NG)] || 7 methods to prevent SQL injection attacks correctly and in a more integrated approach. Methods 1 to 3 are applicable during design or development life cycle. Method 4 is mainly from QA’s perspective. Methods 5 and 6 can be applied to production environment and are applicable even if you do not have access to or if you cannot change the source code. Other non-main stream technology are discussed in Method 7.  || Intermediate|| 8
 +
|-valign="top"
 +
|[[http://www.owasp.org/images/d/d1/AppSec2005DC-Alex_Stamos-Attacking_Web_Services.ppt Attacking Web Services (Alex Stamos)] || Web Services Introduction and Attacks  || Intermediate|| 5
 
|-valign="top"
 
|-valign="top"
|[[http://www.owasp.org/images/d/d1/AppSec2005DC-Alex_Stamos-Attacking_Web_Services.ppt (Alex Stamos)] || Web Services Introduction and Attacks  || Intermediate|| 5|-valign="top"
 
 
|Example (include link) || Fill in your comments || Novice/Intermediate/Expert || 1:bad - 10: the best
 
|Example (include link) || Fill in your comments || Novice/Intermediate/Expert || 1:bad - 10: the best
 
|}
 
|}

Revision as of 04:31, 1 March 2007

This page provide a commented overview of the OWASP presentations available.
Please use the last line of the tables as template.
Presentions can be tracked through:

Everybody is encouraged to link the presentations and add their findings on this page ! There are currently hundreds of presentations all over the OWASP web site. If you search google with “site:owasp.org filetype:ppt” there are 166 hits. “site:owasp.org filetype:pdf” returns 76. Feel free to “mine” them and add them to the overview.

OWASP Project Presentations

OWASP Project Presentations
Title Comment Level Rating (1-10)
The OWASP Testing Guide (Jeff Williams) Overview of the OWASP Testing Guide Novice 7
Example (include link) Fill in your comments Novice/Intermediate/Expert 1:bad - 10: the best


Web Application Security Presentations

Web Application Security Presentations
Title Comment Level Rating (1-10)
[Advanced SQL Injection (Victor Chapela) Detailed methodology for analyzing applications for SQL injection vulnerabilities Expert 9
[Advanced Topics on SQL Injection Protection (Sam NG) 7 methods to prevent SQL injection attacks correctly and in a more integrated approach. Methods 1 to 3 are applicable during design or development life cycle. Method 4 is mainly from QA’s perspective. Methods 5 and 6 can be applied to production environment and are applicable even if you do not have access to or if you cannot change the source code. Other non-main stream technology are discussed in Method 7. Intermediate 8
[Attacking Web Services (Alex Stamos) Web Services Introduction and Attacks Intermediate 5
Example (include link) Fill in your comments Novice/Intermediate/Expert 1:bad - 10: the best