Questions tagged [professional-education]

Formal education and training in preparation for the practice of a profession.

Formal education and training in preparation for the practice of a profession.

231 questions
142
votes
14 answers

What "hacking" competitions/challenges exist?

I have always enjoyed trying to gain access to things I'm not really supposed to play around with. I found Hack This Site a long time ago and I learned a lot from it. The issue I have with HTS is that they haven't updated their content in a very…
KilledKenny
  • 1,662
  • 4
  • 19
  • 28
76
votes
19 answers

What security resources should a white-hat *developer* follow these days?

What sites, twitter accounts, FOSS software should a white-hat code 'hacker' follow these days? Do Include: Late breaking information on new security issues (RSS, Twitter, etc) A website that tracks unpatched security issues per vendor Twitter…
makerofthings7
  • 50,090
  • 54
  • 250
  • 536
69
votes
7 answers

Which topics should a security training for non-IT persons contain?

(I am not sure, if this question fits the security.stackexchange-board, but the list of askable topics does not exclude this question imho and there are some examples) I've worked for several different companies of which some had outsourced their…
hamena314
  • 2,007
  • 1
  • 15
  • 23
52
votes
5 answers

Teaching "Secure by Design"

I'm a Security Architect, and I'm used to defining the security of project as a specification that gets carried out by others. I have been recently tasked with teaching new coders how to design and program using the principles of "Secure by Design"…
schroeder
  • 123,438
  • 55
  • 284
  • 319
50
votes
14 answers

How to learn penetration testing at home?

I am interested in learning ethical hacking or penetration testing to head towards a career in that direction. I have a strong knowledge of linux and unix, basic computer theory and practice and basic programming knowledge (arrays, methods,…
Cyrus
  • 501
  • 2
  • 5
  • 3
44
votes
3 answers

The valid role of obscurity

That security through obscurity is A Bad Thing is received wisdom and dogma in information security. Telling people why something is to be avoided can be considerably more difficult when there is no line delineating what you are trying to ban from…
Bell
  • 975
  • 9
  • 12
43
votes
9 answers

Books about Penetration Testing

What are the books you advise describing methods or steps required to make a successful penetration test? I have a base knowledge of common security checks, but it would be great if someone more experienced describes the full test.
Tornike
  • 593
  • 1
  • 6
  • 8
35
votes
5 answers

How to improve as a security expert

I'm a professional software developer with a high interest in web application security. I'd say that I probably have a better understanding of the security of web applications than the average developer. My problem is, that my knowledge is heavily…
KLE
  • 453
  • 5
  • 5
35
votes
11 answers

Vulnerable OS's?

Which vulnerable OS's like for example DVL would you recommend for someone to use for the purpose of pentest/exploitation learning?
30
votes
16 answers

List of good security blogs one should read

I graduated this year and am working in the security domain. I want to explore security topics and don't have a strong background since it was not part of our curriculum. Can you list some good security blogs which explore various security…
GG01
  • 369
  • 5
  • 7
30
votes
14 answers

Courses on "Secure Software Development"

This semester, I'm offering a course on "secure software development". The course is divided into three parts: Secure Software Engineering Reverse Engineering Secure Coding Do you know of any courses (especially, those offered at universities)…
M.S. Dousti
  • 1,514
  • 17
  • 23
29
votes
5 answers

Professional certifications for IT Security

Which credentials of the sub-list of IT certifications (as per the Information Systems Security Association) would be considered MUST HAVE for a IT Security specialist? CEH Certified Ethical Hacker CIPP Certified Information Privacy…
Eric Warriner
  • 3,251
  • 3
  • 24
  • 20
29
votes
7 answers

How to keep an eye on upgrades, patches and security issues for used open-source libraries?

For a project with many open-source libraries as a part of it, I began to search for information source concerning all upgrades and security issues. The kind of sources I gathered are either announcement list or issue/bug tracker in the form of RSS…
29
votes
9 answers

I see entry level security skills as a problem for industry - what can we do about it?

Okay, so we push corporates to improve security, and provide training to IT staff and awareness presentations to CEO's etc, but each year a new batch of graduates are brought in to companies as others leave, and they typically have one of two…
Rory Alsop
  • 61,367
  • 12
  • 115
  • 320
28
votes
11 answers

Resources to learn about security

I am currently just finishing a undergrad computer science degree, but I know very little about computer security. What are some good resources (aside from this site) to learn the fundamentals of security. I realise that good resources will probably…
oadams
  • 381
  • 4
  • 5
1
2 3
15 16