5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

Aspire     Web App Vulnerability Analyst     Web App Vulnerability Analyst Track 1: OWASP Top 10 Mitigations
Modern on-premises and cloud networks consist of many types of network devices, hosts, and services. Each of these must be configured and monitored to ensure continued compliance with organization security policies. In this course, you'll learn about various types of security misconfigurations, including using default credentials, leaving unnecessary services running, and exposing services unnecessarily to the Internet. Next, you'll explore application container management, including how to pull containers from Docker Hub and then start them. Moving on, you'll examine how containers relate to security, how to harden security settings through Group Policy, and how to manage software updates on-premises and in the cloud.

Objectives

OWASP Top 10: A6 - Security Misconfiguration

  • discover the key concepts covered in this course
  • provide examples of security misconfigurations
  • describe how application containers work
  • manage Docker containers on a Linux computer
  • deploy a cloud-based container registry
  • deploy a cloud-based container
  • apply security settings to users and computers using Microsoft Group Policy
  • assign Azure policies to check Azure resources for security compliance
  • install and configure Windows Server Update Services (WSUS)
  • describe how security misconfigurations can be mitigated
  • summarize the key concepts covered in this course