OWASP Top 10: A05:2021-Security Misconfiguration

OWASP 2022    |    Intermediate
  • 9 Videos | 49m 34s
  • Includes Assessment
  • Earns a Badge
Modern on-premises and cloud networks consist of many types of network devices, hosts, and services. Each of these must be configured and monitored to ensure continued compliance with organizational security policies. In this course, learn about security misconfiguration attack criteria, including using default credentials, leaving unnecessary services running, and exposing services unnecessarily to the Internet. Next, explore application container management, including how to pull containers from Docker Hub and start them. Finally, examine how containers relate to security, how to harden security settings through Group Policy, and how to manage software updates on-premises and in the cloud. Upon completion, you'll be able to detect security misconfigurations and deploy solutions to rectify weaknesses.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    recall examples of security misconfigurations
    outline how application containers work
    manage Docker containers on a Linux computer
    create and populate a cloud-based container registry
  • deploy a cloud-based HTTP container
    harden security settings for users and computers using Microsoft Group Policy
    configure Azure Policy to check for the security compliance of Azure resources
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    45s
    UP NEXT
  • Playable
    2. 
    Security Misconfiguration Attacks
    7m 13s
  • Locked
    3. 
    Application Containers
    5m 40s
  • Locked
    4. 
    Managing Containers Using Docker
    7m 3s
  • Locked
    5. 
    Creating and Populating a Container Registry
    7m 2s
  • Locked
    6. 
    Deploying a Cloud-based HTTP Container
    5m 25s
  • Locked
    7. 
    Hardening Security Settings Using Group Policy
    9m 5s
  • Locked
    8. 
    Configuring Azure Policy for Security Compliance
    6m 28s
  • Locked
    9. 
    Course Summary
    53s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.