OWASP Top 10: #9 Components with Known Vulnerabilities and #10 Insufficient Logging and Monitoring
Offered By: LinkedIn Learning
Course Description
Overview
Prepare for the ninth and tenth most common vulnerabilities on the 2021 OWASP Top 10 List: security logging and monitoring failures and server-side request forgery.
Syllabus
Introduction
- 2021 OWASP Top 10
- OWASP Top 10 series
- What are security monitoring and logging failures?
- Example 1: 2018 Starwood data breach
- Example 2: 2021 South Georgia Medical Center insider threat
- Prevention technique: Ensure logging includes sufficient user context
- Prevention technique: Ensure monitoring and alerting are active and consistent
- Prevention technique: Establish an incident response and recovery plan
- What is Server-Side Request Forgery (SSRF)?
- Example 1: 2019 Capital One breach
- Example 2: 2017 GitHub Enterprise chained exploits
- Prevention technique: Network layer prevention techniques
- Prevention technique: Application layer
- Prevention technique: Require authentication for internal services
- Explore more of the OWASP Top 10
Taught by
Caroline Wong
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network