OWASP Austin - Study Groups
Our Study Groups
|The OWASP Austin Study Group is intended to provide an organized gathering of like-minded IT professionals who want to learn more about application security. This is done through mini-discussions, demos, presentations, and series of meetings to cover more involved topics (i.e. book topics). Generally the topics will be participant-led, meaning that attendees will volunteer their time to present or lead a discussion, whether a one-time presentation of a topic they wish to review or need help with, or walk through topics of a particular chapter of a book being covered. There will still be OWASP leadership involved with scheduling and such, but the idea is to get a better “hands-on” approach to create a more productive learning environment. We learn more when we are involved.|
Current Study Group Topic
When: The study group meets weekly on Thursdays from 12:00 to 1:00 PM
Where: Due to the current pandemic, the study group is held virtually. Either join the specific channel within Slack AustinOWASP (see below) or OWASP Austin on Meetup to obtain details.
How to follow: Status of meetings and discussion of topic will be communicated through the Slack AustinOWASP. Following is the specific channel for collaborating on the topic:
Additional Information: If any questions related to the study group, please contact the Education Coordinator, Matt Pardo, matt (dot) pardo (at) owasp (dot) org.
Previous Study Group Topics
- ” OSINT using the book Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information and other resources.
- “HacktheBox” study using various Capture the Flag(CTF) Challenges on HacktheBox.eu.
- “Windows PowerShell” study using the book Learn Windows PowerShell in a Month of Lunches (3rd Edition) by Donald W. Jones and Jeffrey Hicks (Slack #powershell)
- “Certified Cloud Security Professional (CCSP)” study using the CSP Certified Cloud Security Professional All-in-One Exam Guide (1st Edition) book (Slack #cloud_security_study)
- “Certified Ethical Hacker” book
- “Visible Ops Security” book by Gene Kim
- “Metasploit: The Penetration Tester’s Guide” book by David Kennedy
- “Wireshark 101: Essential Skills for Network Analysis” book by Laura Chappell and Gerald Combs
- “Web Application Defender’s Cookbook: Battling Hackers and Protecting Users” book by Ryan C. Barnett and Jeremiah Grossman
- “The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws” book by Dafydd Stuttard and Marcus Pinto
- “The Practice of Network Security Monitoring: Understanding Incident Detection and Response” book (using Security Onion) by Richard Bejtlich
- “The Browser Hacker’s Handbook” book by Wade Alcorn, Christian Frichot, and Michele Orru
- “Snapshot - Reading and Treating People Right the First Time” book by Dan Korem