layout | title | tags | region | altfooter |
---|---|---|---|---|
col-sidebar |
OWASP Austin - Study Groups |
austin |
North America |
true |
Home Page Chapter Leadership Study Groups Past Events Sponsorship Event Archive
The Austin OWASP Study Group is currently working on learning the "What is ChatGPT Doing and Why Does it Work" by Stephen Wolfram
When: The study group meets weekly on Thursdays from 12:00 to 1:00 PM
Where: We are looking for a location to meet in-person. Till then study group is held virtually. Either join the specific channel within Slack AustinOWASP (see below) or OWASP Austin on Meetup to obtain details.
How to follow: Status of meetings and discussion of topic will be communicated through the Slack AustinOWASP. Following is the specific channel for collaborating on the topic:
#chat-gpt-wolfram
Additional Information: If any questions related to the study group, please contact the the group coordinator, @griff in the OWASP Austin Slack workplace.
- FlipperZero
- "OSINT using the book Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information and other resources.
- "HacktheBox" study using various Capture the Flag(CTF) Challenges on HacktheBox.eu.
- "Windows PowerShell" study using the book Learn Windows PowerShell in a Month of Lunches (3rd Edition) by Donald W. Jones and Jeffrey Hicks (Slack #powershell)
- "Certified Cloud Security Professional (CCSP)" study using the CSP Certified Cloud Security Professional All-in-One Exam Guide (1st Edition) book (Slack #cloud_security_study)
- "Certified Ethical Hacker" book
- "Visible Ops Security" book by Gene Kim
- "Metasploit: The Penetration Tester’s Guide” book by David Kennedy
- "Wireshark 101: Essential Skills for Network Analysis" book by Laura Chappell and Gerald Combs
- “Web Application Defender's Cookbook: Battling Hackers and Protecting Users” book by Ryan C. Barnett and Jeremiah Grossman
- “The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws” book by Dafydd Stuttard and Marcus Pinto
- "The Practice of Network Security Monitoring: Understanding Incident Detection and Response" book (using Security Onion) by Richard Bejtlich
- "The Browser Hacker's Handbook" book by Wade Alcorn, Christian Frichot, and Michele Orru
- "Snapshot - Reading and Treating People Right the First Time" book by Dan Korem