OWASP Top 10: A10 – Insufficient Logging & Monitoring

placeholder

Modern web applications can consist of many components which are often running within application contAIners. Each component must be monitored to detect intrusions. In this course you ll learn about various ways monitoring can be enabled in Linux on individual hosts in Windows and in cloud computing environments. Next you ll explore how to forward log entries to a central logging host in Linux and in Windows. You ll then learn how to monitor cloud-based web application performance. Moving on youÆll examine how to download and configure the Snort IDS by creating IDS rules for Telnet and ICMP network traffic. Lastly you ll learn how to analyze packet captures for suspicious activity and mitigate monitoring deficiencies.