OWASP Top 10: A6 - Security Misconfiguration
OWASP 2021
| Intermediate
- 11 Videos | 1h 7m 54s
- Includes Assessment
- Earns a Badge
Modern on-premises and cloud networks consist of many types of network devices, hosts, and services. Each of these must be configured and monitored to ensure continued compliance with organization security policies. In this course, you'll learn about various types of security misconfigurations, including using default credentials, leaving unnecessary services running, and exposing services unnecessarily to the Internet. Next, you'll explore application container management, including how to pull containers from Docker Hub and then start them. Moving on, you'll examine how containers relate to security, how to harden security settings through Group Policy, and how to manage software updates on-premises and in the cloud.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this courseprovide examples of security misconfigurationsdescribe how application containers workmanage Docker containers on a Linux computerdeploy a cloud-based container registrydeploy a cloud-based container
-
apply security settings to users and computers using Microsoft Group Policyassign Azure policies to check Azure resources for security complianceinstall and configure Windows Server Update Services (WSUS)describe how security misconfigurations can be mitigatedsummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview1m 34sUP NEXT
-
2.Security Misconfiguration Attacks9m 1s
-
3.Application Containers7m 53s
-
4.Managing Containers Using Docker7m 4s
-
5.Creating and Populating a Container Registry8m 51s
-
6.Deploying a Cloud-based HTTP Container7m 27s
-
7.Hardening Security Settings Using Microsoft Group Policy6m 55s
-
8.Configuring Azure Policy for Security Compliance5m 42s
-
9.Managing Patches with Windows Server Update Services6m 22s
-
10.Mitigating Security Misconfigurations5m 54s
-
11.Course Summary1m 13s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.