OWASP: Top 10 Item A10

OWASP 2017    |    Intermediate
  • 10 Videos | 48m 18s
  • Includes Assessment
  • Earns a Badge
Likes 35 Likes 35
A lack of log analysis and security event monitoring results in security breaches going undetected for long periods of time. Learners can explore aspects and recommendations focusing on OWASP Top 10 2017 item A10: Insufficient Logging and Monitoring, in this 10-video course. Key concepts covered here include the details of OWASP Top 10 Item A10, which deals with common logging security flaws and insufficient logging and monitoring; learning how to mitigate insufficient logging and monitoring with an incident response plan; and learning how to configure Windows Event Viewer log forwarding. Next, you will observe how to configure a Linux environment for centralized logging using rsyslog forwarding; how to build a custom Windows Event Viewer log view; and how to attach a PowerShell script to a specific logged event. Finally, learn how to use a Windows Data Collector Set to establish a performance baseline; and how to use the Windows Performance Monitor tool to create a performance baseline and identify performance anomalies which could indicate security compromises.

WHAT YOU WILL LEARN

  • describe OWASP Top 10 item A10 which deals with insufficient logging and monitoring
    recognize how insufficient logging and monitoring can be mitigated
    configure Windows Event Viewer log forwarding
    configure Linux rsyslog forwarding
    build a custom Windows Event Viewer log view
  • attach a PowerShell script to a specific logged event
    use a Windows Data Collector Set to establish a performance baseline
    use the Windows Performance Monitor tool to identify performance anomalies
    list common logging security flaws and insufficient logging and monitoring security mitigations, create a custom Windows Event Viewer log view, and create a Windows Server performance baseline

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 38s
    UP NEXT
  • Playable
    2. 
    A10 - Insufficient Logging & Monitoring
    2m 55s
  • Locked
    3. 
    Mitigating Insufficient Logging and Monitoring
    6m 9s
  • Locked
    4. 
    Protecting Sensitive Data at Rest
    3m 36s
  • Locked
    5. 
    Linux Centralized Logging
    6m 50s
  • Locked
    6. 
    Custom Log Views
    3m 17s
  • Locked
    7. 
    Log Alerts
    5m 20s
  • Locked
    8. 
    Performance Monitor Baseline
    5m 4s
  • Locked
    9. 
    Monitoring Windows Performance
    3m
  • Locked
    10. 
    Exercise: Configure Logs and Monitor Performance
    6m 28s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 103 Likes 103  
Likes 26 Likes 26  
Likes 24 Likes 24  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

COURSE SOLID & GRASP
Likes 3218 Likes 3218  
Likes 244 Likes 244  
Likes 107 Likes 107