Difference between revisions of "Transparency"

m
(Roll to)
Line 1: Line 1:
InfoSec Institute: Information Security Training
+
{{WikiWayNav}}
 +
<includeonly>==I Try to [[BeTransparent]] {{EditIcon|BeTransparent}}==</includeonly>
 +
When you have nothing to hide, it's easy to be transparent.
 +
We should create a world, where every mind feels fine in the light of the public.
  
Application Security Training: Web Application Hacking
+
==Why the Invisible Man Has Nothing on AboutUs==
 +
[[Image:noperson.png|left]] Transparency is a pivotal value at [[AboutUs]] both for our staff and our [[Portal:AboutUsCommunity|community]] at large.  It involves our commitment to openness and accountability.  We affirm our values by publishing notes of our meetings, using open source coding, communicating in public [[TalkPage|talk pages]] and a public IRC channel, and providing a record of our edits on each of our [[PersonalPage| Personal Pages]].
  
The latest frontier in information security is undoubtedly application security. The average sized organization has hundreds of in-house and externally developed applications. With business processes increasingly moving towards the web services and the software-as-a-service model catching on, many organizations today are exposing data and critical business services to untested or insecure applications.
+
It is our hope that by publicizing our actions and our projects we will engage you, our community and vice versa. If you would like to help [[collaborating_to_build_the_commons|build the commons]], please see  [[HowYouCanHelp|how you can help]].
  
These applications with inadequate or non-existent security are a veritable treasure trove for malicious hackers. Most hackers have realized that enterprise-class organizations have firewalls in place and have a working patching policy for externally available hosts. Increasingly, the first route in to a critical database containing customer information, credit card data, proprietary data or classified information is through a vulnerable application.
+
==Why is this important?==
  
InfoSec Institute’s Application Security: Web Application Hacking will position you as an able and ready Application Security Professional. You will gain skills on how to assess applications from a hacker’s point of view, understand application security vulnerabilities and learn how to close these security holes so they are never exploited by a hacker.
+
Transparency builds trust. If you are using a false name, not your own, people may wonder why. It may not be desirable to reveal everything about yourself but a name is something to build upon. Communities can only really begin to develop if the members of that community know each other.
  
Application Security: Web Application Hacking is a unique offering in the security industry. While some security courses may brush over application security, or cover the security of small-scale “demo” applications, InfoSec Institute concentrates on the latest application security attacks against modern, enterprise, applications.
+
==Radical Transparency is a potential component of universal ethics==
 +
In a more and more complex world, the critical processes that make up the safety and well being of our planet, need the maximal awareness of all minds. Governments only represent a tiny fraction of the "Global Brain".  Therefore, opt for "Don't subordinate it under OpenGovernment". Of course, if every mind is continuously participating in OpenGovernment in the widest sense, then "Merge" is an option for me.
  
This hands-on course teaches you:
+
==How do I do this?==
  
    * The fundamentals of modern Application Security on both .Net and Java platforms
+
Your user page is a good place to start.
    * Application security threats and assessment/attack techniques
+
* Give your [[:Category:IPreferRealPeople|real name]]
    * The latest threats to Web Services and AJAX-enabled applications
+
* Include a photo of yourself
 +
* Add some information about yourself such as your interest.
  
InfoSec Institute has only the highest quality instructors, with deep background in Application Security. Our instructors are actively involved in the Application Security community. They have authored several books on the subject, spoken at various industry conferences, and are considered subject matter experts.
+
For more information on transparency start here:
  
Application Security: Web Application Hacking is a totally hands on course. While a student in this class, you will be engaged in a thought-provoking lecture on the topic at hand, and then directly implement the relevant hands-on lab exercise in our Application Security Lab. Some of the lectures included in the course:
+
==External Links==
 +
* [[Wikipedia:Radical transparency]]
 +
* [http://www.wired.com/wired/archive/15.04/wired40_ceo.html Wired Magazine Article on Radical Transparency]
  
Some of the topics you will learn to master during the Application Security Training:
+
==[[BiLinks]]==
  
    * Secure Programming Throughout the Application Development Lifecycle
+
<->
    * Confronting Flawed Input Data
+
* [http://en.wikipedia.org/wiki/Talk:Radical_transparency WikiPedia:Talk:Radical_transparency]
    * Implementation Best Practices
+
* [[User_talk:TedErnst#Why_BiLinks?]] ''BiLinks as a tool to increase Transparency''
    * Source code analysis scanning software
+
* [[User_talk:Fridemar#BiLinks]]
    * Code Origin Access Control Methods
+
* [http://www.longtail.com/the_long_tail/2006/11/in_praise_of_ra.html?cid=105401038#comment-105401038 Longtail:InPraiseOfRadicalTransparency] ''Blog, devoted to the Topic. Suggested there in a BlogComment to bilink all communities that discuss/practise Transparency'' --[[User:Fridemar|fridemar]] 16:38, 1 March 2008 (PST)
    * Network Transmission Security with the JSSE API/SSL
+
[[Category:AboutUsValues]]
    * WS Security, XKMS, and WS-I Basic security profile
 
    * SecureXML Libraries
 
    * Privilege Escalation Opportunities
 
    * Race Conditions
 
    * Cross Site Scripting Injection
 
    * .Net Secure Remoting
 
    * Windows Forms Security
 
    * SQL Server: Exploitation and Defense
 
  
 
+
__NOTOC__
 
 
    * Fault Injection and Fuzzing
 
    * Java security managers, policy files, and JAAS
 
    * ASP.NET Security
 
    * XOR, Base64 and Garbage Data Obfuscation
 
    * Securely Maintaining Session State – Best Practices
 
    * Session fixation
 
    * Vulnerabilties in AJAX-enabled applications
 
    * Advanced SQL Injection
 
    * Oracle PL/SQL Injection
 
    * .Net Security tokens, XML signature, XML canonicalization, and XML encryption
 
    * .Net WS-Trust and WS-SecureConversation
 
    * Error Control Verbosity Abuse
 
 
 
Need more detail? Check out the 5 Day Detailed Application Security Syllabus
 
 
 
How You Benefit:
 
 
 
    * Gain the in-demand career skills of an Application Security Professional. Learn application security fundamentals, hands on application assessment techniques and methodologies used by the top application security professionals.
 
    * In this application security training course, learn the how and when it is appropriate to use tools to automate vulnerability discovery and when manual investigation is required.
 
    * Develop a custom process for code assessments across many languages and platforms.
 
      More than interesting theories and lecture, get your hands dirty in our dedicated hacking lab in this network security training course.
 
 
 
What's Included:
 
 
 
    * 5 Days of Application Security training from a senior instructor with real-world application assessment and remediation experience.
 
    * Guaranteed small class size (less than 10-16 Students), you get an intimate learning setting not offered at any of our competitors.
 
    * InfoSec's Custom Application Security Enterprise Suite, includes every program covered in the course for at home study.
 
    * All meals, snacks and refreshments included.
 
    * Certified Application Security Specialist (CASS) exam fees.
 
    * Lecture, Lab Exercise and Text book
 
 
 
Required Prerequisites:
 
 
 
    * Firm understanding of the Windows Operating System
 
    * Programming skills in any standard language (Perl, C++/C#, Java, etc.)
 
    * Exposure to web application development
 
    * Desire to learn about application security and web application hacking!
 
    * Ethical intentions
 
 
 
If you are unsure if you meet the required prerequisites, contact us for a quick skill check.
 
 
 
Current Course List:
 

Revision as of 21:06, 16 November 2009


When you have nothing to hide, it's easy to be transparent. We should create a world, where every mind feels fine in the light of the public.

Why the Invisible Man Has Nothing on AboutUs

noperson.png
Transparency is a pivotal value at AboutUs both for our staff and our community at large. It involves our commitment to openness and accountability. We affirm our values by publishing notes of our meetings, using open source coding, communicating in public talk pages and a public IRC channel, and providing a record of our edits on each of our Personal Pages.

It is our hope that by publicizing our actions and our projects we will engage you, our community and vice versa. If you would like to help build the commons, please see how you can help.

Why is this important?

Transparency builds trust. If you are using a false name, not your own, people may wonder why. It may not be desirable to reveal everything about yourself but a name is something to build upon. Communities can only really begin to develop if the members of that community know each other.

Radical Transparency is a potential component of universal ethics

In a more and more complex world, the critical processes that make up the safety and well being of our planet, need the maximal awareness of all minds. Governments only represent a tiny fraction of the "Global Brain". Therefore, opt for "Don't subordinate it under OpenGovernment". Of course, if every mind is continuously participating in OpenGovernment in the widest sense, then "Merge" is an option for me.

How do I do this?

Your user page is a good place to start.

  • Give your real name
  • Include a photo of yourself
  • Add some information about yourself such as your interest.

For more information on transparency start here:

External Links

BiLinks



Retrieved from "http://aboutus.com/index.php?title=Transparency&oldid=19892479"