The OWASP Top 10 features the most critical web application security vulnerabilities. In this part, A09: Security Logging and Monitoring Failures, you'll take advice from a trusted offensive security professional on how to implement best practices for developing security logging and monitoring solutions at your organization.
Learning Objectives
You will gain insights of the history and significance of these incidents.
Custom hands-on labs created by our vendor partner, Cydefe, which allow you to identify, exploit, and mitigate these critical vulnerabilities, as well as offer remediation advice to clients.
Framework Connections
Specialty Areas
- Cyber Operations
- Exploitation Analysis
Feedback
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.