25.8.2
This website uses cookies to ensure you get the best experience on our website. Learn more

OWASP Top 10: A10 - Insufficient Logging & Monitoring

Skillsoft issued completion badges are earned based on viewing the percentage required or receiving a passing score when assessment is required. Modern web applications can consist of many components, which are often running within application containers. Each component must be monitored to detect intrusions. In this course, you'll learn about various ways monitoring can be enabled in Linux on individual hosts, in Windows, and in cloud computing environments. Next, you'll explore how to forward log entries to a central logging host in Linux and in Windows. You'll then learn how to monitor cloud-based web application performance. Moving on, you’ll examine how to download and configure the Snort IDS by creating IDS rules for Telnet and ICMP network traffic. Lastly, you'll learn how to analyze packet captures for suspicious activity and mitigate monitoring deficiencies.

Issued on

April 4, 2023

Expires on

Does not expire