Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LinkedIn Learning

OWASP Top 10: #9 Components with Known Vulnerabilities and #10 Insufficient Logging and Monitoring

via LinkedIn Learning

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Prepare for the ninth and tenth most common vulnerabilities on the 2021 OWASP Top 10 List: security logging and monitoring failures and server-side request forgery.

Syllabus

Introduction
  • 2021 OWASP Top 10
  • OWASP Top 10 series
1. Security Monitoring and Logging Failures
  • What are security monitoring and logging failures?
  • Example 1: 2018 Starwood data breach
  • Example 2: 2021 South Georgia Medical Center insider threat
  • Prevention technique: Ensure logging includes sufficient user context
  • Prevention technique: Ensure monitoring and alerting are active and consistent
  • Prevention technique: Establish an incident response and recovery plan
2. Server-Side Request Forgery
  • What is Server-Side Request Forgery (SSRF)?
  • Example 1: 2019 Capital One breach
  • Example 2: 2017 GitHub Enterprise chained exploits
  • Prevention technique: Network layer prevention techniques
  • Prevention technique: Application layer
  • Prevention technique: Require authentication for internal services
Conclusion
  • Explore more of the OWASP Top 10

Taught by

Caroline Wong

Reviews

4.6 rating at LinkedIn Learning based on 56 ratings

Start your review of OWASP Top 10: #9 Components with Known Vulnerabilities and #10 Insufficient Logging and Monitoring

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.