Company: Pluralsight Author: Peter Mosmans Full Title: Secure Coding: Preventing Insufficient Logging And Monitoring Year: 2018 Language: English Genre: Educational: Security Skill Level: Intermediate Price: - - Files: MP4 (+ Subtitles .SRT, Slides .PDF) Time: 01:23:36 Video: AVC, 1280 x 720 (1.778) at 15.000 fps, 200 kbps Audio: AAC at 96 Kbps, 2 channels, 44.1 KHz Most security breaches start with a single incident. This course will teach you how to set up correct logging and monitoring for your application, as well as what to log and what not to log in order to detect those incidents on time. It is extremely important for the security of your company to know what's currently happening to your application. This can be achieved by proper application logging and monitoring. In this course, Secure Coding: Preventing Insufficient Logging & Monitoring, you will learn what to think of when setting up logging and monitoring for applications. First, You will learn what is meant with the risk of insufficient logging and monitoring. Next, you'll explore what your application should and shouldn't log. Finally, you'll discover how to ensure and improve the quality of log files. When you're finished with this course, you'll have all the application logging and monitoring skills and knowledge needed to detect (future) security incidents on time. Lessons: 1. Course Overview 01. Course Overview 2. Understanding Insufficient Logging and Monitoring 02. Course Introduction 03. Introducing the Scenario 04. What Is Insufficient Logging and Monitoring? 05. Insufficient Logging & Monitoring and the OWASP Top 10 06. Logging, Monitoring, and Alerting 07. Module Summary 3. Determining What Applications Should and Should Not Log 08. Module Introduction 09. The Dangers of Logging Too Much 10. The Purposes of Logging 11. Events to Log and Monitor 12. Who Decides What to Log and Monitor? 13. Module Summary 4. Improving and Ensuring the Quality of Logfiles 14. Module Introduction 15. Where to Record Log Data 16. The Format of Log Files 17. Logging Personal Data 18. Module Summary 5. Applying an Effective Monitoring Strategy 19. Module Introduction 20. Log Management 21. Defining Response Strategies 22. Available Solutions 23. Summary Our members see more. Join us! ------------- Our members see more. Join us!