OWASP Austin - Study Groups

Home Page    Chapter Leadership    Study Groups    Past Events    Sponsorship    Event Archive

Our Study Groups

The OWASP Austin Study Group is intended to provide an organized gathering of like-minded IT professionals who want to learn more about application security. This is done through mini-discussions, demos, presentations, and series of meetings to cover more involved topics (i.e. book topics). Generally the topics will be participant-led, meaning that attendees will volunteer their time to present or lead a discussion, whether a one-time presentation of a topic they wish to review or need help with, or walk through topics of a particular chapter of a book being covered. There will still be OWASP leadership involved with scheduling and such, but the idea is to get a better “hands-on” approach to create a more productive learning environment. We learn more when we are involved. Study Group Logo

Windows PowerShell

The Austin OWASP Study Group is currently working through various Capture the Flag(CTF) Challenges on HacktheBox.eu. It is open to all who are interested and ready to learn a lot about pen testing and CTFs!.

When: The study group meets weekly on Thursdays from 12:00 to 1:00 PM

Where: National Instruments, Building A, Room 217 (Directions: GoogleMaps, MapQuest

How to follow: Status of meetings and discussion of topic will be communicated through the Slack AustinOWASP. Following is the specific channel for collaborating on the topic:

#hackthebox

Additional Information: If any questions related to the study group, please contact the Education Coordinator, Matt Pardo, matt (dot) pardo (at) owasp (dot) org.


Previous Study Group Topics

  • “Windows PowerShell” study using the book Learn Windows PowerShell in a Month of Lunches (3rd Edition) by Donald W. Jones and Jeffrey Hicks (Slack #powershell)
  • “Certified Cloud Security Professional (CCSP)” study using the CSP Certified Cloud Security Professional All-in-One Exam Guide (1st Edition) book (Slack #cloud_security_study)
  • “Certified Ethical Hacker” book
  • “Visible Ops Security” book by Gene Kim
  • “Metasploit: The Penetration Tester’s Guide” book by David Kennedy
  • “Wireshark 101: Essential Skills for Network Analysis” book by Laura Chappell and Gerald Combs
  • “Web Application Defender’s Cookbook: Battling Hackers and Protecting Users” book by Ryan C. Barnett and Jeremiah Grossman
  • “The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws” book by Dafydd Stuttard and Marcus Pinto
  • “The Practice of Network Security Monitoring: Understanding Incident Detection and Response” book (using Security Onion) by Richard Bejtlich
  • “The Browser Hacker’s Handbook” book by Wade Alcorn, Christian Frichot, and Michele Orru
  • “Snapshot - Reading and Treating People Right the First Time” book by Dan Korem