OWASP: Top 10 Item A10
OWASP
| Intermediate
- 10 videos | 44m 18s
- Includes Assessment
- Earns a Badge
A lack of log analysis and security event monitoring results in security breaches going undetected for long periods of time. Learners can explore aspects and recommendations focusing on OWASP Top 10 2017 item A10: Insufficient Logging and Monitoring, in this 10-video course. Key concepts covered here include the details of OWASP Top 10 Item A10, which deals with common logging security flaws and insufficient logging and monitoring; learning how to mitigate insufficient logging and monitoring with an incident response plan; and learning how to configure Windows Event Viewer log forwarding. Next, you will observe how to configure a Linux environment for centralized logging using rsyslog forwarding; how to build a custom Windows Event Viewer log view; and how to attach a PowerShell script to a specific logged event. Finally, learn how to use a Windows Data Collector Set to establish a performance baseline; and how to use the Windows Performance Monitor tool to create a performance baseline and identify performance anomalies which could indicate security compromises.
WHAT YOU WILL LEARN
-
Describe owasp top 10 item a10 which deals with insufficient logging and monitoringRecognize how insufficient logging and monitoring can be mitigatedConfigure windows event viewer log forwardingConfigure linux rsyslog forwardingBuild a custom windows event viewer log view
-
Attach a powershell script to a specific logged eventUse a windows data collector set to establish a performance baselineUse the windows performance monitor tool to identify performance anomaliesList common logging security flaws and insufficient logging and monitoring security mitigations, create a custom windows event viewer log view, and create a windows server performance baseline
IN THIS COURSE
-
1m 38s
-
2m 55sAfter completing this video, you will be able to describe OWASP Top 10 item A10, which deals with insufficient logging and monitoring. FREE ACCESS
-
6m 9sAfter completing this video, you will be able to recognize how insufficient logging and monitoring can be improved. FREE ACCESS
-
3m 36sIn this video, learn how to configure Windows Event Viewer to forward logs. FREE ACCESS
-
6m 50sIn this video, you will configure Linux rsyslog forwarding. FREE ACCESS
-
3m 17sIn this video, you will build a custom log view for Windows Event Viewer. FREE ACCESS
-
5m 20sIn this video, you will learn how to attach a PowerShell script to a specific logged event. FREE ACCESS
-
5m 4sIn this video, find out how to use a Windows Data Collector Set to establish a performance baseline. FREE ACCESS
-
3mIn this video, you will learn how to use the Windows Performance Monitor tool to identify performance anomalies. FREE ACCESS
-
6m 28sUpon completion of this video, you will be able to list common logging security flaws and insufficient logging and monitoring security mitigations, create a custom Windows Event Viewer log view, and create a Windows Server performance baseline. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.