Security School

Web Security School Lesson 2

In Lesson 2 of Web Security School, guest instructor Michael Cobb explains what to expect and look for when analyzing an attack on a Web server. He presents a guide to logging and auditing leads, and reviews essential fortification, countermeasures and other recommended security enhancements for your server.

   Webcast: Web attacks and how to defeat them
   Technical paper: Life at the edge: Securing the network perimeter
   Quiz: Lesson 2
   About the Instructor

MAIN MENU
Web Security School Home

Lesson 1

Lesson 2

Lesson 3


  

Webcast: Web attacks and how to defeat them

Guest instructor Michael Cobb takes an in-depth look at how Web sites are attacked and what you can do to reduce the likelihood of a successful attack. He reviews the role of logging and auditing in combating attacks, and outlines the best countermeasures you can take to stay ahead of hackers and safeguard your Web site. You will also learn about tools that help show you where you stand in the fight against hackers. As with the first Web Security School webcast, you will be given several checklists to help you review your Web site's security. This webcast is available on-demand. Through our agreement with (ISC)², all CISSP and SSCP participants who attend this webcast can earn one CPE credit.

Webcast companion materials:

  • Windows tools for investigating an attack   (Download PDF)
  • Essential fortification checklist   (Download PDF)


  • BEGIN THE WEBCAST   (Download PDF)
    Find out how you can earn CPE credits

    Now available as an MP3: Web attacks and how to defeat them

      

    Technical paper: Life at the edge: Securing the network perimeter

    In this four-part paper, learn strategies for resisting attacks on a network. Guest instructor Michael Cobb takes you through the process of securing a network perimeter by examining Web security architectures, explaining how to use encryption and testing a network perimeter for survivability.

  • Part 1: An overview of Web security architectures
  • Part 2: Divide and conquer -- DMZs
  • Part 3: Resistance to failure
  • Part 4: How to protect yourself when things go wrong
  • READ THIS TECHNICAL PAPER   (Download PDF)

      

    Quiz: Lesson 2

    The final part of this lesson is the quiz to assess your knowledge of analyzing Web server attacks. In order to successfully pass the quiz, you need to attend the webcast and read the technical paper.

    TAKE THE QUIZ   (Download PDF)

      About the Instructor


    Michael Cobb, CISSP-ISSAP, is a renowned security author with more than 10 years experience in the IT industry and another 16 years experience in finance. He is the founder and managing director of Cobweb Applications Ltd., a consultancy that offers IT training and support in data security and analysis. He co-authored the book IIS Security and has written numerous technical articles for leading IT publications. Cobb is also a Microsoft Certified Database Administrator and a Microsoft Certified Professional.

      

    This was first published in June 2005

    There are Comments. Add yours.

     
    TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

    REGISTER or login:

    Forgot Password?
    By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
    Sort by: OldestNewest

    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to: