OWASP Top 10: A6 – Security Misconfiguration
Modern on-premises and cloud networks consist of many types of network devices hosts and services. Each of these must be configured and monitored to ensure continued compliance with organization security policies. In this course youll learn about various types of security misconfigurations including using default credentials leaving unnecessary services running and exposing services unnecessarily to the Internet. Next youll explore application container management including how to pull containers from Docker Hub and then start them. Moving on youll examine how containers relate to security how to harden security settings through Group Policy and how to manage software updates on-premises and in the cloud.