AI Product Expert Certification - Master Generative AI Skills
Gain a Splash of New Skills - Coursera+ Annual Nearly 45% Off
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Prepare for the ninth and tenth most common vulnerabilities on the 2021 OWASP Top 10 List: security logging and monitoring failures and server-side request forgery.
Syllabus
Introduction
- 2021 OWASP Top 10
- OWASP Top 10 series
- What are security monitoring and logging failures?
- Example 1: 2018 Starwood data breach
- Example 2: 2021 South Georgia Medical Center insider threat
- Prevention technique: Ensure logging includes sufficient user context
- Prevention technique: Ensure monitoring and alerting are active and consistent
- Prevention technique: Establish an incident response and recovery plan
- What is Server-Side Request Forgery (SSRF)?
- Example 1: 2019 Capital One breach
- Example 2: 2017 GitHub Enterprise chained exploits
- Prevention technique: Network layer prevention techniques
- Prevention technique: Application layer
- Prevention technique: Require authentication for internal services
- Explore more of the OWASP Top 10
Taught by
Caroline Wong