Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
Module 1: Introduction
Module 2: Demonstration
Module 3: Defenses
Module 4: Lab Solutions
What are security misconfigurations? Security Misconfiguration arises when security settings are defined, implemented, and maintained as defaults. Why do I need this certification? If a system is compromised through faulty security configurations, data can be stolen or modified slowly over time and can be time-consuming and costly to recover. What will I learn? What security misconfigurations are How they work How to protect against them Get your Security Misconfigurations Certification Today: Security Misconfiguration arises when Security settings are defined, implemented, and maintained as defaults. Good security requires having a secure configuration defined and deployed for the application, frameworks, application server, web server, database server, and platform. Defaults are often insecure, so secure settings should be defined, implemented, and maintained regularly. Attackers find these misconfigurations through unauthorized access to default accounts, unused web pages, unpatched flaws, unprotected files and directories and more. If a system is compromised through faulty security configurations, data can be stolen or modified slowly over time and can be time-consuming and costly to recover. The Security Misconfigurations Micro Certification will explore security misconfigurations in detail, ensuring you will learn how to combat and protect against this type of attack.SEL