Secure Coding: Preventing Insufficient Logging and Monitoring
Offered By: Pluralsight
Course Description
Overview
Most security breaches start with a single incident. This course will teach you how to set up correct logging and monitoring for your application, as well as what to log and what not to log in order to detect those incidents on time.
It is extremely important for the security of your company to know what's currently happening to your application. This can be achieved by proper application logging and monitoring. In this course, Secure Coding: Preventing Insufficient Logging & Monitoring, you will learn what to think of when setting up logging and monitoring for applications. First, You will learn what is meant with the risk of insufficient logging and monitoring. Next, you'll explore what your application should and shouldn't log. Finally, you'll discover how to ensure and improve the quality of log files. When you're finished with this course, you'll have all the application logging and monitoring skills and knowledge needed to detect (future) security incidents on time.
Topics:
It is extremely important for the security of your company to know what's currently happening to your application. This can be achieved by proper application logging and monitoring. In this course, Secure Coding: Preventing Insufficient Logging & Monitoring, you will learn what to think of when setting up logging and monitoring for applications. First, You will learn what is meant with the risk of insufficient logging and monitoring. Next, you'll explore what your application should and shouldn't log. Finally, you'll discover how to ensure and improve the quality of log files. When you're finished with this course, you'll have all the application logging and monitoring skills and knowledge needed to detect (future) security incidents on time.
Topics:
- Course Overview
- Understanding Insufficient Logging and Monitoring
- Determining What Applications Should and Should Not Log
- Improving and Ensuring the Quality of Logfiles
- Applying an Effective Monitoring Strategy
Taught by
Peter Mosmans
Related Courses
C++ Superpowers and MoreInfosec via Coursera Advance Your Skills in Python
LinkedIn Learning Developing Secure Software
LinkedIn Learning Programming Foundations: Secure Coding
LinkedIn Learning Secure Coding in C
LinkedIn Learning