Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

OWASP Top 10: #9 Components with Known Vulnerabilities and #10 Insufficient Logging and Monitoring

Description

Dive into the ninth and tenth categories of security vulnerabilities in the OWASP Top 10: using components with known vulnerabilities and insufficient logging and monitoring.

Tags

Syllabus

Introduction
  • Prevent common software vulnerabilities
1. Using Components with Known Vulnerabilities: How Does It Work?
  • General concept
2. Impact of Using Components with Known Vulnerabilities
  • Example scenario 1
  • Example scenario 2
3. Preventing Using Components with Known Vulnerabilities
  • Continuously inventory and monitor
  • Apply virtual patches
4. Insufficient Logging and Monitoring: How Does It Work?
  • General concept
5. Impact of Insufficient Logging and Monitoring
  • Example scenario 1
  • Example scenario 2
6. Preventing Insufficient Logging and Monitoring
  • Ensure logs have sufficient user context
  • Ensure timely detection and response
  • Establish an incident response plan
Conclusion
  • Next steps

Online Course


OWASP Top 10: #9 Components with Known Vulnerabilities and #10 Insufficient Logging and Monitoring

Affiliate notice

Dive into the ninth and tenth categories of security vulnerabilities in the OWASP Top 10: using components with known vulnerabilities and insufficient logging and monitoring.

Introduction
  • Prevent common software vulnerabilities
1. Using Components with Known Vulnerabilities: How Does It Work?
  • General concept
2. Impact of Using Components with Known Vulnerabilities
  • Example scenario 1
  • Example scenario 2
3. Preventing Using Components with Known Vulnerabilities
  • Continuously inventory and monitor
  • Apply virtual patches
4. Insufficient Logging and Monitoring: How Does It Work?
  • General concept
5. Impact of Insufficient Logging and Monitoring
  • Example scenario 1
  • Example scenario 2
6. Preventing Insufficient Logging and Monitoring
  • Ensure logs have sufficient user context
  • Ensure timely detection and response
  • Establish an incident response plan
Conclusion
  • Next steps