OWASP Top 10: A09:2021-Security Logging & Monitoring Failures
OWASP
| Intermediate
- 10 videos | 57m 42s
- Includes Assessment
- Earns a Badge
Modern web applications can consist of many components which are often running within application containers. Each component must be monitored to detect intrusions. In this course, learn how monitoring can be enabled in Linux on individual hosts, Windows, and cloud computing environments. Next, explore how to forward log entries to a central logging host in Linux and Windows, monitor cloud-based web application performance, and download and configure the Snort IDS by creating IDS rules. Finally, practice analyzing packet captures for suspicious activity and mitigating monitoring deficiencies. Upon completion, you'll be able to ensure that monitoring is deployed correctly and the timely detection of past security breaches and security incidents in the midst of occurring.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseRecognize the importance of logging at all levels, including application loggingDifferentiate between siem and soar monitoring and incident response solutionsConfigure syslog-ng in linux to forward log entries to a central logging hostMonitor web app performance metrics in the cloud
-
Identify how intrusion detection and prevention can be deployed and usedInstall the snort idsConfigure and test snort ids rulesAnalyze suspicious network traffic using a wireshark packet captureSummarize the key concepts covered in this course
IN THIS COURSE
-
49s
-
8m 10s
-
7m 2s
-
8m 6s
-
6m 47s
-
6m 19s
-
5m 3s
-
6m 55s
-
7m 29s
-
1m 2s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.