• Online, Self-Paced
Course Description

Modern web applications can consist of many components which are often running within application containers. Each component must be monitored to detect intrusions.

In this course, learn how monitoring can be enabled in Linux on individual hosts, Windows, and cloud computing environments. Next, explore how to forward log entries to a central logging host in Linux and Windows, monitor cloud-based web application performance, and download and configure the Snort IDS by creating IDS rules. Finally, practice analyzing packet captures for suspicious activity and mitigating monitoring deficiencies.

Upon completion, you'll be able to ensure that monitoring is deployed correctly and the timely detection of past security breaches and security incidents in the midst of occurring.

Learning Objectives

{"discover the key concepts covered in this course"}

Framework Connections