Insufficient Attack Protection
Deploying sufficient attack protection is essential to keeping sensitive information safe from hacking attempts. In this module, we’ll discuss web-application requirements regarding detection, prevention and response to both manual and automated attacks.
OWASP Top Ten Overview
This module will cover the Open Web Application Security Project’s list of the ten most dangerous Web application security flaws.
Insufficient Logging and Monitoring
It is imperative that server administrators maintain robust logs of activity on their servers. This module covers the risks associated with improper monitoring.
Ready to be inspired? Join us in Chicago for Infosec Inspire19
The Infosec IQ user conference designed for you — two days packed with actionable education, industry best practices, IQ sneak peeks and networking.