Get a free account
Insufficient Logging and Monitoring
Training Modules
Related content
Insufficient Attack Protection
Deploying sufficient attack protection is essential to keeping sensitive information safe from hacking attempts. In this module, we’ll discuss web-application requirements regarding detection, prevention and response to both manual and automated attacks.
Insecure Deserialization
This module covers best practices for serialization - the process of turning data objects into binary streams of data.
Buffer Overflow
This module discusses the risks caused by buffer overflows and how to avoid them.