OWASP Top 10: A10 - Insufficient Logging & Monitoring
OWASP
| Intermediate
- 11 videos | 1h 6m 49s
- Includes Assessment
- Earns a Badge
Modern web applications can consist of many components, which are often running within application containers. Each component must be monitored to detect intrusions. In this course, you'll learn about various ways monitoring can be enabled in Linux on individual hosts, in Windows, and in cloud computing environments. Next, you'll explore how to forward log entries to a central logging host in Linux and in Windows. You'll then learn how to monitor cloud-based web application performance. Moving on, you'll examine how to download and configure the Snort IDS by creating IDS rules for Telnet and ICMP network traffic. Lastly, you'll learn how to analyze packet captures for suspicious activity and mitigate monitoring deficiencies.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseRecognize the importance of logging at all levels, including application loggingDifferentiate between siem and soar monitoring and incident response solutionsConfigure syslog-ng in linux to forward log entries to a central logging hostMonitor web app performance metrics in the cloudDescribe how intrusion detection and prevention can be deployed and used
-
Install the snort idsConfigure and test snort ids rulesUse an online service to analyze a wireshark packet captureDeploy security controls to correct monitoring deficienciesSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 36s
-
7m 41s
-
6m 48s
-
8m 44s
-
9m 1s
-
7m 22s
-
6m 1s
-
7m
-
5m 57s
-
5m 26s
-
1m 12s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.