AdvancedSecurityCertificationLearningPath
AdvancedSecurityCertificationLearningPath
Welcome
Instructions
Operationalizing Security
S UMMAR Y
Welcome
The Advanced Security Certification focuses on Dynatrace Practitioners who use security as
part of their daily lives. This certification allows individuals to show they can leverage Dynatrace
Application Security to understand and remediate vulnerabilities faster.
Instructions
This learning path is the key to your success in achieving the required skills and knowledge
needed for the Advanced Security Certification. We recommend that you follow along in order to
best prepare for your certification exam.
Prerequisites
Before embarking on the Dynatrace Advanced Security Learning Path and scheduling the exam,
ensure you meet the following prerequisites:
Exam Details
Before embarking on the Dynatrace Advanced Security Learning Path and scheduling the exam,
ensure you meet the following prerequisites:
The exam consists of 70 written questions and 10-20 practical
questions.
System Requirements
Ensure your system meets the following requirements before attempting the exam:
Test your readiness with Examity here. Examity will use GoToMeeting for
remote proctoring.
Environmental Requirements
Adhere to the following environmental requirements during the exam:
Remain alone in the room throughout the test; book a conference room or
equivalent private space if taking the exam at your workplace.
Identity Confirmation
You will need to confirm your identity with the Examity proctor, including providing your ID and
answering security questions set during account creation.
Accommodation
If you require accommodation to access the exam, please create a support ticket to request
assistance. Dynatrace is committed to ensuring exam accessibility for all individuals.
Lesson 3 of 7
Application Security
Application security is a critical aspect of software
development, aimed at identifying, fixing, and
preventing security vulnerabilities within applications. It
encompasses practices that safeguard sensitive data and
application code, including measures during
development, design, and post-deployment.
READ B LOG
READ B LOG
Read about cloud application security and the changes, challenges, and
opportunities of evolving cloud security solutions.
READ B LOG
READ B LOG
in detecting vulnerabilities and attacks sooner and more accurately than before.
Learn more about Dynatrace Application Security solutions and use cases.
VI SI T P AGE
VI SI T P AGE
VI SI T P AGE
Hear how Dynatrace capabilities played a critical role in identifying the log4j
vulnerability.
WAT CH VI DEO
Hear Skyworks’ story from Vice President and CIO, Satya Jayadev
VI SI T P AGE
Hear USI Insurance Services’ story from Software Lead Architect, Wendy Mathis
VI SI T P AGE
Read Soldo’s story from Head of Cloud Operations and DevOps, Luca Domenella
VI SI T P AGE
WAT CH VI DEO
need immediate investigation. Watch this video to learn how to get started.
WAT CH VI DEO
Enable Runtime Application Protection
Lastly, you can enable Dynatrace Runtime Application Protection to detect and block attacks on
your applications automatically and in real time. Watch this video to learn how to get started.
WAT CH VI DEO
VI SI T P AGE
VI SI T P AGE
Account Management
VI SI T P AGE
VI SI T P AGE
Dynatrace Managed license management
VI SI T P AGE
VI SI T P AGE
Call to Action
To help you gain hands-on experience in activating
Application Security, it’s recommended that you take the
following actions in a Dynatrace environment, for
example, Dynatrace Playground.
In this lesson, we will further examine the Runtime Vulnerability Analytics capability. Upon
completion, you should:
The Application Security Overview allows security teams to effectively manage risk and make
informed decisions about resource allocation and remediation efforts.
Watch the following video to learn more and take a closer look.
WAT CH VI DEO
Third-party vulnerabilities
A third-party vulnerability is a security problem detected in the third-party libraries loaded in
your environment.
VI SI T P AGE
Code-level vulnerabilities
In addition to third-party vulnerability detection for known vulnerabilities in third-party libraries
used in your environment, Dynatrace code-level vulnerability detection detects unknown
vulnerabilities in closed-source or custom application code.
VI SI T P AGE
Risk assessment
Davis AI analyzes and prioritizes vulnerabilities in your environment to provide a risk
Watch this video to learn about how the Davis Security Score is calculated and why
it’s the most precise risk-assessment score available.
WAT CH VI DEO
VI SI T P AGE
Check out this video for a closer look at third-party vulnerabilities and how to
make use of the details provided.
WAT CH VI DEO
Your deployed Dynatrace monitoring mode can influence the Application Security
results displayed in Dynatrace. Read about the implications for third-party
vulnerabilities.
VI SI T P AGE
WAT CH VI DEO
You can also change the status of vulnerabilities if you determine they don't
require attention in your environment. Watch this video to learn how and its
impact.
WAT CH VI DEO
VI SI T P AGE
VI SI T P AGE
Managing Code-level vulnerabilities
To see a list of all detected code-level vulnerabilities in your environment, go to Code-Level
Vulnerabilities.
Check out this video for a closer look at code-level vulnerabilities and how to make
use of these details for mitigation.
WAT CH VI DEO
Your deployed Dynatrace monitoring mode can influence the Application Security
results displayed in Dynatrace. Read about the implications for code-level
vulnerabilities.
VI SI T P AGE
WAT CH VI DEO
VI SI T P AGE
Call to Action
To help you gain hands-on experience with Runtime
Vulnerability Analytics, it’s recommended that you take
the following actions in a Dynatrace environment, for
example, Dynatrace Playground.
What is the fix for the vulnerability with CVE ID: CVE-2021-44228?
In this lesson, we will further examine the Runtime Application Protection capability. Upon
completion, you should:
Understand the value proposition of Runtime Application Protection
Attacks
Third-party and code-level vulnerabilities tell you a vulnerability is present and should be fixed,
while Runtime Application Protection alerts you that an attack is happening.
An attack is any request (call) from a certain client IP to your application code with malicious
intent that targets a code-level vulnerability.
WAT CH VI DEO
Managing Attacks
Each attack detected can be expanded to perform additional actions.
WAT CH VI DEO
For a closer look at allowlist and blocklist configurations, check out Configuring
Runtime Application Protection Rules.
WAT CH VI DEO
VI SI T P AGE
Call to Action
To help you gain hands-on experience with Runtime
Application Protection, it’s recommended that you take
the following actions in a Dynatrace environment, for
example, Dynatrace Playground.
1 Explore Attacks.
Operationalizing Security
Operationalizing Security
The convergence of observability and security provides a
comprehensive, real-time view of an organization's
application environment and security posture. Using the
power of Grail and the security data ingested into it,
various data analysis, reporting, and automation use
cases can be implemented to meet the needs of
DevSecOps teams and their stakeholders.
In this section, we will explore how to use of security insights provided by Dynatrace Application
Security.
DevSecOps automation
threats. It uses a combination of data collection, data aggregation, and AI to detect, identify,
and defend against security threats.
Dynatrace Query Language (DQL) is used to explore data stored in Grail. Explore
DQL documentation.
VI SI T P AGE
VI SI T P AGE
VI SI T P AGE
Check out the built-in security query snippets in Dashboards and Notebooks.
VI SI T P AGE
VI SI T P AGE
Metrics Classic
You can use Application Security metrics to create charts and pin them to your (classic)
dashboards. Learn more about the available metrics and how you can make use of them.
VI SI T P AGE
VI SI T P AGE
Incident response
Dynatrace automatically discovers security issues in your environment and provides
contextualized, automated risk assessments and details via the Dynatrace Web UI and API.
Integrate security notifications with Dynatrace to pass security issues to your teams for
alerting and remediation purposes.
Built-in Notifications
Explore security notifications for vulnerabilities.
VI SI T P AGE
VI SI T P AGE
WAT CH VI DEO
VI SI T P AGE
VI SI T P AGE
DevSecOps automation
DevSecOps automation encourages organizations to discover that application security should be
a collaborative responsibility between all teams involved in the software delivery lifecycle (SDLC)
rather than a traditional, siloed approach. With DevSecOps, organizations can combine security
and observability with automation, transforming the SDLC into a quicker, more secure, software
release process.
Read about DevSecOps challenges, best practices, and more.
READ B LOG
READ B LOG
Security gates ensure that code meets key security requirements defined by
development and security stakeholders. Check out a security gate example using
Dynatrace’s Site Reliability Guardian.
READ B LOG
Read about how it can help you eliminate blind spots, drive automation, and
operationalize application security.
READ B LOG
Learn more about the app capabilities, how to get started, and the insights
available.
VI SI T P AGE
WAT CH VI DEO
Watch this webinar on how to automate & simplify Application Security with
Dynatrace.
WAT CH VI DEO
Security Investigator
Dynatrace Security Investigator is designed for threat hunting, incident solving, and root cause
analysis and provides assisted functionalities and automations to speed up and support
investigation resolution. It supported evidence-driven security use cases based on logs, metrics,
and traces ingested into Grail.
READ B LOG
Learn more about how Dynatrace Security Investigator can help during your
investigations.
READ B LOG
VI SI T P AGE
VI SI T P AGE
Watch the Dynatrace app spotlight on the Dynatrace Security Investigator to see
it in action.
WAT CH VI DEO
Call to Action
To help you gain hands-on experience in operationalizing
security, it’s recommended that you take the following
actions in a Dynatrace environment, for example,
Dynatrace Playground.
1 In the Third-party Vulnerabilities app, create (and explore) a security
report (dashboard) using the 'Threat Exposure template'.
4 In the Site Reliability Guardian app, create a new guardian using the
‘Security gate’ template. (Note: You won't be able to save it in the
Playground environment.)
In this section, you will familiarize with answers to the most frequently asked questions for
Application Security.
VI SI T P AGE