5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

Aspire     Web App Vulnerability Analyst     Web App Vulnerability Analyst Track 1: OWASP Top 10 Mitigations
Modern web applications can consist of many components, which are often running within application containers. Each component must be monitored to detect intrusions. In this course, you'll learn about various ways monitoring can be enabled in Linux on individual hosts, in Windows, and in cloud computing environments. Next, you'll explore how to forward log entries to a central logging host in Linux and in Windows. You'll then learn how to monitor cloud-based web application performance. Moving on, you’ll examine how to download and configure the Snort IDS by creating IDS rules for Telnet and ICMP network traffic. Lastly, you'll learn how to analyze packet captures for suspicious activity and mitigate monitoring deficiencies.

Objectives

OWASP Top 10: A10 - Insufficient Logging & Monitoring

  • discover the key concepts covered in this course
  • recognize the importance of logging at all levels, including application logging
  • differentiate between SIEM and SOAR monitoring and incident response solutions
  • configure syslog-ng in Linux to forward log entries to a central logging host
  • monitor web app performance metrics in the cloud
  • describe how intrusion detection and prevention can be deployed and used
  • install the Snort IDS
  • configure and test Snort IDS rules
  • use an online service to analyze a Wireshark packet capture
  • deploy security controls to correct monitoring deficiencies
  • summarize the key concepts covered in this course