Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.
OWASP Top 10: #9 Components with Known Vulnerabilities and #10 Insufficient Logging and Monitoring
Description
Dive into the ninth and tenth categories of security vulnerabilities in the OWASP Top 10: using components with known vulnerabilities and insufficient logging and monitoring.
Tags
Syllabus
Introduction
- Prevent common software vulnerabilities
- General concept
- Example scenario 1
- Example scenario 2
- Continuously inventory and monitor
- Apply virtual patches
- General concept
- Example scenario 1
- Example scenario 2
- Ensure logs have sufficient user context
- Ensure timely detection and response
- Establish an incident response plan
- Next steps
![](https://d3f1iyfxxz8i1e.cloudfront.net/courses/course_image/5111733cdae2.jpeg)
OWASP Top 10: #9 Components with Known Vulnerabilities and #10 Insufficient Logging and Monitoring
Affiliate notice
-
TypeOnline Course
-
Provider
Dive into the ninth and tenth categories of security vulnerabilities in the OWASP Top 10: using components with known vulnerabilities and insufficient logging and monitoring.
Introduction
- Prevent common software vulnerabilities
- General concept
- Example scenario 1
- Example scenario 2
- Continuously inventory and monitor
- Apply virtual patches
- General concept
- Example scenario 1
- Example scenario 2
- Ensure logs have sufficient user context
- Ensure timely detection and response
- Establish an incident response plan
- Next steps
Tags
Loading...
Saving...
Loading...