OWASP Top 10: #9 Components with Known Vulnerabilities and #10 Insufficient Logging and Monitoring

Go to class
Write Review

Free Online Course: OWASP Top 10: #9 Components with Known Vulnerabilities and #10 Insufficient Logging and Monitoring provided by LinkedIn Learning is a comprehensive online course, which lasts for Less than 1 hour of material. The course is taught in English and is free of charge. Upon completion of the course, you can receive an e-certificate from LinkedIn Learning. OWASP Top 10: #9 Components with Known Vulnerabilities and #10 Insufficient Logging and Monitoring is taught by Caroline Wong.

Overview
  • Dive into the ninth and tenth categories of security vulnerabilities in the OWASP Top 10: using components with known vulnerabilities and insufficient logging and monitoring.

Syllabus
  • Introduction

    • Prevent common software vulnerabilities
    1. Using Components with Known Vulnerabilities: How Does It Work?
    • General concept
    2. Impact of Using Components with Known Vulnerabilities
    • Example scenario 1
    • Example scenario 2
    3. Preventing Using Components with Known Vulnerabilities
    • Continuously inventory and monitor
    • Apply virtual patches
    4. Insufficient Logging and Monitoring: How Does It Work?
    • General concept
    5. Impact of Insufficient Logging and Monitoring
    • Example scenario 1
    • Example scenario 2
    6. Preventing Insufficient Logging and Monitoring
    • Ensure logs have sufficient user context
    • Ensure timely detection and response
    • Establish an incident response plan
    Conclusion
    • Next steps