Security awareness games by Infosec
On-demand training for every cybersecurity role
Certification training from industry experts
2021 IT & Security Talent Pipeline Study
Cyber Work Podcast
New cybersecurity career conversations every week
Join a team dedicated to making a difference.
Duration: 3:27 Minutes
It is imperative that server administrators maintain robust logs of activity on their servers. This module covers the risks associated with improper monitoring.
This module discusses use of components with known vulnerabilities (such as libraries and frameworks) that may undermine application defenses and enable various attacks.
This module defines underprotected APIs, explains why API security is important and discusses common attack methods and mitigation strategies.
Deploying sufficient attack protection is essential to keeping sensitive information safe from hacking attempts. In this module, we’ll discuss web-application requirements regarding detection, prevention and response to both manual and automated attacks.