Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

To Log, or Not to Log! That Is the Question - DefCamp - 2022

DefCamp via YouTube

Overview

This course covers the importance of logging in cybersecurity, including its role in security, incident response processes, challenges, handling sensitive data, and examples of logging practices. Participants will learn about delivering, storing, and analyzing logs, as well as access control and best practices for logging various types of information such as credit card details and authentication tokens. The course is designed for cybersecurity enthusiasts, specialists, software developers, and anyone interested in enhancing their technical skills in the field.

Syllabus

Intro
About Amir
About Booking Holding
Agenda
Why log
Security related usage
Incident response process
Challenges
Sensitive data
Not so trivial
Delivering logs
Storing logs
Analyzing logs
Access control
Logging examples
Credit card information
Authentication tokens
User input security
Base structure
Highlevel overview
Defining a standard
Data
Delivery
Storage
Audience Questions

Taught by

DefCamp

Reviews

Start your review of To Log, or Not to Log! That Is the Question - DefCamp - 2022

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.