PLU | Secure Coding: Preventing Insufficient Logging And Monitoring (2018 EN)

Discussion in 'Information Technology' started by Kanka, Nov 30, 2019.

  1. Kanka

    Kanka Well-Known Member Loyal User

    Messages:
    16,037
    Likes Received:
    449
    Trophy Points:
    83
    [​IMG]

    Company: Pluralsight
    Author: Peter Mosmans
    Full Title: Secure Coding: Preventing Insufficient Logging And Monitoring
    Year: 2018
    Language: English
    Genre: Educational: Security
    Skill Level: Intermediate
    Price: -
    -
    Files: MP4 (+ Subtitles .SRT, Slides .PDF)
    Time: 01:23:36
    Video: AVC, 1280 x 720 (1.778) at 15.000 fps, 200 kbps
    Audio: AAC at 96 Kbps, 2 channels, 44.1 KHz



    Most security breaches start with a single incident. This course will teach you how to set up correct logging and monitoring for your application, as well as what to log and what not to log in order to detect those incidents on time.

    It is extremely important for the security of your company to know what's currently happening to your application. This can be achieved by proper application logging and monitoring. In this course, Secure Coding: Preventing Insufficient Logging & Monitoring, you will learn what to think of when setting up logging and monitoring for applications. First, You will learn what is meant with the risk of insufficient logging and monitoring. Next, you'll explore what your application should and shouldn't log. Finally, you'll discover how to ensure and improve the quality of log files. When you're finished with this course, you'll have all the application logging and monitoring skills and knowledge needed to detect (future) security incidents on time.


    Lessons:
    1. Course Overview
    01. Course Overview
    2. Understanding Insufficient Logging and Monitoring
    02. Course Introduction
    03. Introducing the Scenario
    04. What Is Insufficient Logging and Monitoring?
    05. Insufficient Logging & Monitoring and the OWASP Top 10
    06. Logging, Monitoring, and Alerting
    07. Module Summary
    3. Determining What Applications Should and Should Not Log
    08. Module Introduction
    09. The Dangers of Logging Too Much
    10. The Purposes of Logging
    11. Events to Log and Monitor
    12. Who Decides What to Log and Monitor?
    13. Module Summary
    4. Improving and Ensuring the Quality of Logfiles
    14. Module Introduction
    15. Where to Record Log Data
    16. The Format of Log Files
    17. Logging Personal Data
    18. Module Summary
    5. Applying an Effective Monitoring Strategy
    19. Module Introduction
    20. Log Management
    21. Defining Response Strategies
    22. Available Solutions
    23. Summary


    -------------