Insufficient Logging and Monitoring
Log Monitoring and Analysis Assessment
This module defines underprotected APIs, explains why API security is important and discusses common attack methods and mitigation strategies.
Insufficient Attack Protection
Deploying sufficient attack protection is essential to keeping sensitive information safe from hacking attempts. In this module, we’ll discuss web-application requirements regarding detection, prevention and response to both manual and automated attacks.
Infosec Named a Leader in 2019 Gartner Magic Quadrant
Recognized for ability to execute and completeness of vision in Security Awareness Computer-Based Training, learn the latest market trends and what we believe sets Infosec apart.