Application Analysis with ModSecurity
Offered By: Pluralsight
Course Description
Overview
ModSecurity is an open source, cross platform web
application firewall (WAF) engine. In this course, you will
learn to Analyze Applications using ModSecurity.
As defenders, we must contend with targeted and opportunistic attacks against web infrastructure. We need a way to mitigate these attacks while maintaining global availability of enterprise web services. In this course, Application Analysis with ModSecurity, you'll cover how to utilize ModSecurity to secure a live enterprise environment. First, you'll learn how to use the Open Web Application Security Project (OWASP) Core Rule Set (CRS). Next, you'll explore how to detect and block SQL injection attacks. Finally, you’ll discover how to mitigate brute force credential stuffing attacks. When you’re finished with this course, you’ll have the skills and knowledge to detect and mitigate web-based threats against your web applications using ModSecurity.
application firewall (WAF) engine. In this course, you will
learn to Analyze Applications using ModSecurity.
As defenders, we must contend with targeted and opportunistic attacks against web infrastructure. We need a way to mitigate these attacks while maintaining global availability of enterprise web services. In this course, Application Analysis with ModSecurity, you'll cover how to utilize ModSecurity to secure a live enterprise environment. First, you'll learn how to use the Open Web Application Security Project (OWASP) Core Rule Set (CRS). Next, you'll explore how to detect and block SQL injection attacks. Finally, you’ll discover how to mitigate brute force credential stuffing attacks. When you’re finished with this course, you’ll have the skills and knowledge to detect and mitigate web-based threats against your web applications using ModSecurity.
Syllabus
- Course Overview (Tool Introduction) 1min
- Detection with ModSecurity 21mins
- Resources 1min
Taught by
Michael Edie
Related Courses
Web App Testing - EnumerationCyber Mentor via YouTube Full Ethical Hacking Course - Beginner Network Penetration Testing
Cyber Mentor via YouTube Zero to Hero Pentesting - Exploitation, Shells, and Some Credential Stuffing
Cyber Mentor via YouTube Top Active Directory Attacks - Understand, then Prevent and Detect
RSA Conference via YouTube Protecting Accounts from Credential Stuffing with Password Breach Alerting
USENIX via YouTube