OWASP Top 10: A09:2021-Security Logging & Monitoring Failures
Modern web applications can consist of many components which are often running within application containers. Each component must be monitored to detect intrusions. In this course learn how monitoring can be enabled in Linux on individual hosts Windows and cloud computing environments. Next explore how to forward log entries to a central logging host in Linux and Windows monitor cloud-based web application performance and download and configure the Snort IDS by creating IDS rules. Finally practice analyzing packet captures for suspicious activity and mitigating monitoring deficiencies. Upon completion youll be able to ensure that monitoring is deployed correctly and the timely detection of past security breaches and security incidents in the midst of occurring.