OWASP: Top 10 Item A10

OWASP    |    Intermediate
  • 10 videos | 44m 18s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 92 users Rating 4.5 of 92 users (92)
A lack of log analysis and security event monitoring results in security breaches going undetected for long periods of time. Learners can explore aspects and recommendations focusing on OWASP Top 10 2017 item A10: Insufficient Logging and Monitoring, in this 10-video course. Key concepts covered here include the details of OWASP Top 10 Item A10, which deals with common logging security flaws and insufficient logging and monitoring; learning how to mitigate insufficient logging and monitoring with an incident response plan; and learning how to configure Windows Event Viewer log forwarding. Next, you will observe how to configure a Linux environment for centralized logging using rsyslog forwarding; how to build a custom Windows Event Viewer log view; and how to attach a PowerShell script to a specific logged event. Finally, learn how to use a Windows Data Collector Set to establish a performance baseline; and how to use the Windows Performance Monitor tool to create a performance baseline and identify performance anomalies which could indicate security compromises.

WHAT YOU WILL LEARN

  • Describe owasp top 10 item a10 which deals with insufficient logging and monitoring
    Recognize how insufficient logging and monitoring can be mitigated
    Configure windows event viewer log forwarding
    Configure linux rsyslog forwarding
    Build a custom windows event viewer log view
  • Attach a powershell script to a specific logged event
    Use a windows data collector set to establish a performance baseline
    Use the windows performance monitor tool to identify performance anomalies
    List common logging security flaws and insufficient logging and monitoring security mitigations, create a custom windows event viewer log view, and create a windows server performance baseline

IN THIS COURSE

  • 1m 38s
  • 2m 55s
    After completing this video, you will be able to describe OWASP Top 10 item A10, which deals with insufficient logging and monitoring. FREE ACCESS
  • Locked
    3.  Mitigating Insufficient Logging and Monitoring
    6m 9s
    After completing this video, you will be able to recognize how insufficient logging and monitoring can be improved. FREE ACCESS
  • Locked
    4.  Protecting Sensitive Data at Rest
    3m 36s
    In this video, learn how to configure Windows Event Viewer to forward logs. FREE ACCESS
  • Locked
    5.  Linux Centralized Logging
    6m 50s
    In this video, you will configure Linux rsyslog forwarding. FREE ACCESS
  • Locked
    6.  Custom Log Views
    3m 17s
    In this video, you will build a custom log view for Windows Event Viewer. FREE ACCESS
  • Locked
    7.  Log Alerts
    5m 20s
    In this video, you will learn how to attach a PowerShell script to a specific logged event. FREE ACCESS
  • Locked
    8.  Performance Monitor Baseline
    5m 4s
    In this video, find out how to use a Windows Data Collector Set to establish a performance baseline. FREE ACCESS
  • Locked
    9.  Monitoring Windows Performance
    3m
    In this video, you will learn how to use the Windows Performance Monitor tool to identify performance anomalies. FREE ACCESS
  • Locked
    10.  Exercise: Configure Logs and Monitor Performance
    6m 28s
    Upon completion of this video, you will be able to list common logging security flaws and insufficient logging and monitoring security mitigations, create a custom Windows Event Viewer log view, and create a Windows Server performance baseline. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 344 users Rating 4.6 of 344 users (344)
Rating 4.5 of 23 users Rating 4.5 of 23 users (23)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 121 users Rating 4.5 of 121 users (121)
Rating 4.6 of 128 users Rating 4.6 of 128 users (128)
Rating 4.5 of 237 users Rating 4.5 of 237 users (237)