Abstract

Vulnerabilities in your web applications pose a serious risk to your organization. Skilled attackers can exploit these vulnerabilities to gain access to private data or to compromise your infrastructure. 

In this course, you will think like an attacker and perform common application-level attacks against a web application. You will then leverage Datadog Application Security Management (ASM) to identify which users are targeting your applications and which resources are impacted. You will use ASM to investigate several of the OWASP Top Ten web security risks, including server-side request forgery (SSRF), code injection, and SQL injection attacks. After completing this course, you will be prepared to defend your web applications using ASM. 

Learning Objectives

By the end of this course, you will be able to:

  • Configure the Datadog Container Agent for Datadog Application Security Management (ASM) and Cloud Security Management (CSM)
  • Instrument an application to send security traces to ASM
  • Use the ASM Traces Explorer and ASM Signals Explorer to detect and investigate application-level attacks
  • Write a custom ASM detection rule
  • Use Datadog Cloud Security Management (CSM) to identify attack paths that exploit application vulnerabilities and reach the underlying cloud infrastructure.

Primary Audience

This course is designed for security engineers, DevOps engineers, and developers interested in securing web applications with Datadog.

Prerequisites

Technical Requirements

Google Chrome or Firefox

Course Navigation

At the bottom of each lesson, click MARK LESSON COMPLETE AND CONTINUE button so that you are marked complete for each lesson and can receive the certificate at the end of the course.

Course Enrollment Period

Please note that your enrollment in this course ends after 30 days. You can re-enroll at any time and pick up where you left off.

Course Curriculum

    1. Introduction

    2. Application Security Management (ASM)

    3. Cloud Security Management (CSM)

    1. Lab overview

    2. Lab: Detect application attacks with Application Security Management

    1. Summary and resources

    2. Feedback survey

Detect Application Attacks with Application Security Management

  • 3 hours to complete
  • 4 Lessons
  • Intermediate