What You Need to Know Before
You Start
Starts 8 June 2025 16:48
Ends 8 June 2025
00
days
00
hours
00
minutes
00
seconds
OWASP Honeypot Project - Web Application Security Through Threat Intelligence
Discover how honeypots and threat intelligence can enhance web application security through automated monitoring, analysis, and mitigation of sophisticated cyber threats.
Security BSides London
via YouTube
Security BSides London
2544 Courses
14 minutes
Optional upgrade avallable
Not Specified
Progress at your own speed
Free Video
Optional upgrade avallable
Overview
Discover how honeypots and threat intelligence can enhance web application security through automated monitoring, analysis, and mitigation of sophisticated cyber threats.
Syllabus
- Introduction to Web Application Security
- Understanding Honeypots
- The OWASP Honeypot Project
- Threat Intelligence Fundamentals
- Integrating Honeypots with Threat Intelligence
- Automated Monitoring and Analysis
- Threat Mitigation Strategies
- Case Studies and Hands-On Practice
- Best Practices and Ethical Considerations
- Closing and Future Directions
Overview of web application security fundamentals
Common web vulnerabilities (e.g., SQL Injection, XSS)
Importance of proactive security measures
Definition and purpose of honeypots
Types of honeypots (low-interaction vs. high-interaction)
Deployment and configuration of honeypots
Goals and benefits of the OWASP Honeypot Project
Key features and components
Case studies and real-world applications
What is threat intelligence?
Types of threat intelligence (strategic, tactical, operational, technical)
Sources and collection methods
How honeypots generate threat intelligence data
Tools for analyzing honeypot data
Sharing and leveraging threat intelligence
Setting up automated monitoring systems
Analyzing attack patterns and trends
Identifying false positives and true threats
Responding to detected threats
Utilizing threat intelligence for proactive mitigation
Continuous improvement of security posture
Analyzing real-world examples of honeypot deployments
Practical exercises in deploying and configuring honeypots
Simulating attacks and interpreting data
Ethical considerations in deploying honeypots
Legal implications and compliance
Industry best practices for honeypot deployment
Recap of key concepts and learnings
Future trends in honeypot technology and threat intelligence
Final Q&A and resources for further study
Subjects
Programming