Secure Coding: Preventing Insufficient Logging and Monitoring
Most security breaches start with a single incident. This course will teach you how to set up correct logging and monitoring for your application, as well as what to log and what not to log in order to detect those incidents on time.
It is extremely important for the security of your company to know what’s currently happening to your application. This can be achieved by proper application logging and monitoring. In this course, Secure Coding: Preventing Insufficient Logging & Monitoring, you will learn what to think of when setting up logging and monitoring for applications. First, You will learn what is meant with the risk of insufficient logging and monitoring. Next, you’ll explore what your application should and shouldn’t log. Finally, you’ll discover how to ensure and improve the quality of log files. When you’re finished with this course, you’ll have all the application logging and monitoring skills and knowledge needed to detect (future) security incidents on time.
Author Name: Peter Mosmans
Author Description:
Peter started out in the nineties as software engineer working on internet banking applications for various European financial institutions. After developing, he moved to the role of defending and designing systems and networks for high-availability websites. Since 2004 he started specializing in breaking: pentesting complex and feature-rich web applications. Currently he leads a global team of highly skilled penetration testers as lead pentester. He is a contributor to several open-source penet… more
Table of Contents
- Course Overview
1min - Understanding Insufficient Logging and Monitoring
24mins - Determining What Applications Should and Should Not Log
22mins - Improving and Ensuring the Quality of Logfiles
18mins - Applying an Effective Monitoring Strategy
16mins
There are no reviews yet.