Difference between revisions of "OWASP Education"

From OWASP
Jump to: navigation, search
 
(5 intermediate revisions by one user not shown)
Line 1: Line 1:
This page provide a commented overview of the OWASP presentations available.<br>
+
See [[:Category:OWASP_Education_Project]]
Please use the last line of the tables as template.<br>
+
Presentions can be tracked through:
+
* the [http://www.owasp.org/index.php/Category:OWASP_Presentations OWASP Presentations Category]
+
* [http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference Past OWASP Conference agenda's]
+
* From the chapter pages
+
Everybody is encouraged to link the presentations and add their findings on this page !
+
There are currently hundreds of presentations all over the OWASP web site.
+
If you search google with “site:owasp.org filetype:ppt” there are 166 hits. “site:owasp.org filetype:pdf” returns 76.
+
Feel free to “mine” them and add them to the overview.
+
 
+
== OWASP Project Presentations ==
+
{| border="1" cellpadding="2"
+
|+ OWASP Project Presentations
+
!width="30%" |Title
+
!width="40%" |Comment
+
!width="15%" |Level
+
!width="15%" |Rating (1-10)
+
|-valign="top"
+
|[http://www.owasp.org/images/a/af/OWASP_Testing_Guide_Presentation.zip The OWASP Testing Guide (Jeff Williams)] || Overview of the OWASP Testing Guide || Novice || 7
+
|-valign="top"
+
|Example (include link) || Fill in your comments || Novice/Intermediate/Expert || 1:bad - 10: the best
+
|}
+
 
+
<br>
+
 
+
== Web Application Security Presentations ==
+
{| border="1" cellpadding="2"
+
|+ Web Application Security Presentations
+
!width="30%" |Title
+
!width="40%" |Comment
+
!width="15%" |Level
+
!width="15%" |Rating (1-10)
+
|-valign="top"
+
|[[http://www.owasp.org/images/7/74/Advanced_SQL_Injection.ppt Advanced SQL Injection (Victor Chapela)] || Detailed methodology for analyzing applications for SQL injection vulnerabilities || Expert|| 9
+
|-valign="top"
+
|[[http://www.owasp.org/images/7/7d/Advanced_Topics_on_SQL_Injection_Protection.ppt Advanced Topics on SQL Injection Protection (Sam NG)] || 7 methods to prevent SQL injection attacks correctly and in a more integrated approach. Methods 1 to 3 are applicable during design or development life cycle. Method 4 is mainly from QA’s perspective. Methods 5 and 6 can be applied to production environment and are applicable even if you do not have access to or if you cannot change the source code. Other non-main stream technology are discussed in Method 7.  || Intermediate|| 8
+
|-valign="top"
+
|[[http://www.owasp.org/images/d/d1/AppSec2005DC-Alex_Stamos-Attacking_Web_Services.ppt Attacking Web Services (Alex Stamos)] || Web Services Introduction and Attacks  || Intermediate|| 5
+
|-valign="top"
+
|Example (include link) || Fill in your comments || Novice/Intermediate/Expert || 1:bad - 10: the best
+
|}
+
 
+
 
+
<br>
+
 
+
 
+
 
+
 
+
[[Category:OWASP Education Project]]
+
[[Category:OWASP Presentations]]
+

Latest revision as of 22:26, 3 March 2007

See Category:OWASP_Education_Project