This course explains how testers and developers can determine if their web applications are vulnerable to the A10:2017 Insufficient Logging and Monitoring vulnerability identified by the Open Web Application Security Project (OWASP). It also explains how to protect web applications against this vulnerability. In this course, you will learn how to test your application for insufficient logging and monitoring, and you will learn how to protect your application against insufficient logging and monitoring.
On successful completion of this course, learners should have the knowledge and skills to:
- Determine if a web application is vulnerable to Insufficient Logging and Monitoring
- Explain how to protect the application against this security vulnerability
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.