Featured resource
pluralsight tech forecast
2025 Tech Forecast

Which technologies will dominate in 2025? And what skills do you need to keep up?

Check it out
Hamburger Icon
  • Course
    • Libraries: If you want this course, consider one of these libraries.
    • Security

Secure Coding: Preventing Insufficient Logging and Monitoring

Most security breaches start with a single incident. This course will teach you how to set up correct logging and monitoring for your application, as well as what to log and what not to log in order to detect those incidents on time.

Peter Mosmans - Pluralsight course - Secure Coding: Preventing Insufficient Logging and Monitoring
by Peter Mosmans

What you'll learn

It is extremely important for the security of your company to know what's currently happening to your application. This can be achieved by proper application logging and monitoring. In this course, Secure Coding: Preventing Insufficient Logging & Monitoring, you will learn what to think of when setting up logging and monitoring for applications. First, You will learn what is meant with the risk of insufficient logging and monitoring. Next, you'll explore what your application should and shouldn't log. Finally, you'll discover how to ensure and improve the quality of log files. When you're finished with this course, you'll have all the application logging and monitoring skills and knowledge needed to detect (future) security incidents on time.

Table of contents

About the author

Peter Mosmans - Pluralsight course - Secure Coding: Preventing Insufficient Logging and Monitoring
Peter Mosmans

Peter started out in the nineties as software engineer working on internet banking applications for various European financial institutions. Since 2004, he started specializing in pentesting complex and feature-rich web applications. Currently, he leads a global team of highly skilled and enthusiastic penetration testers as lead pentester.

More Courses by Peter