Difference between revisions of "OWASP Education"

From OWASP
Jump to: navigation, search
 
(6 intermediate revisions by one other user not shown)
Line 1: Line 1:
This page provide a commented overview of the OWASP presentations available.<br>
+
See [[:Category:OWASP_Education_Project]]
Please use the last line of the tables as template.<br>
 
Presentions can be tracked through:
 
* the [http://www.owasp.org/index.php/Category:OWASP_Presentations OWASP Presentations Category]
 
* [http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference Past OWASP Conference agenda's]
 
* From the chapter pages
 
Everybody is encouraged to link the presentations and add their findings on this page !
 
There are currently hundreds of presentations all over the OWASP web site.
 
If you search google with “site:owasp.org filetype:ppt” there are 166 hits. “site:owasp.org filetype:pdf” returns 76.
 
Feel free to “mine” them and add them to the overview.
 
 
 
== OWASP Project Presentations ==
 
{| border="1" cellpadding="2"
 
|+ OWASP Project Presentations
 
!width="30%" |Title
 
!width="40%" |Comment
 
!width="15%" |Level
 
!width="15%" |Rating (1-10)
 
|-valign="top"
 
|[http://www.owasp.org/images/a/af/OWASP_Testing_Guide_Presentation.zip The OWASP Testing Guide (Jeff Williams)] || Overview of the OWASP Testing Guide || Novice || 7
 
|-valign="top"
 
|Example (include link) || Fill in your comments || Novice/Intermediate/Expert || 1:bad - 10: the best
 
|}
 
 
 
<br>
 
 
 
== Web Application Security Presentations ==
 
{| border="1" cellpadding="2"
 
|+ Web Application Security Presentations
 
!width="30%" |Title
 
!width="40%" |Comment
 
!width="15%" |Level
 
!width="15%" |Rating (1-10)
 
|-valign="top"
 
|[[http://www.owasp.org/images/7/74/Advanced_SQL_Injection.ppt Advanced SQL Injection (Victor Chapela)] || Detailed methodology for analyzing applications for SQL injection vulnerabilities || Expert|| 9
 
|-valign="top"
 
|[[http://www.owasp.org/images/7/7d/Advanced_Topics_on_SQL_Injection_Protection.ppt (Sam NG)] || 7 methods to prevent SQL injection attacks correctly and in a more integrated approach. Methods 1 to 3 are applicable during design or development life cycle. Method 4 is mainly from QA’s perspective. Methods 5 and 6 can be applied to production environment and are applicable even if you do not have access to or if you cannot change the source code. Other non-main stream technology are discussed in Method 7.  || Intermediate|| 8
 
|-valign="top"
 
|[[http://www.owasp.org/images/d/d1/AppSec2005DC-Alex_Stamos-Attacking_Web_Services.ppt (Alex Stamos)] || Web Services Introduction and Attacks  || Intermediate|| 5|-valign="top"
 
|Example (include link) || Fill in your comments || Novice/Intermediate/Expert || 1:bad - 10: the best
 
|}
 
 
 
 
 
<br>
 
 
 
 
 
 
 
 
 
[[Category:OWASP Education Project]]
 
[[Category:OWASP Presentations]]
 

Latest revision as of 22:26, 3 March 2007

See Category:OWASP_Education_Project