logo
Udemy – Log analysis – Detecting Web Attacks. 2024-8

Udemy – Log analysis – Detecting Web Attacks. 2024-8

Published on: 2024-09-29 21:52:26

Categories: 28

Share:

Description

Log analysis course – Detecting Web Attacks.. This course is designed to teach learners about the enormous value of web server and authentication logs or logs in general and how the information contained in these logs can be used to detect any attack. Useful when your web server or authentication service may be running. or an attack that has already occurred. This course explains the basics of web servers and how to log in default web server logging locations. We also explain the structure of the logs and the default logging locations for the most commonly used web servers – Apache, Nginx, and Microsoft IIS. Authentication servers such as SSH and FTP as these are also often subjected to brute force attacks.

What is in the course of Log analysis – Detecting Web Attacks. You will learn:

  • Web server basics, FTP, SSH logs and their common logging formats
  • Read and understand log entries
  • Visualize and distinguish between normal and attack traffic
  • Detect common attacks like SQLi, XSS, command injection, LFI/RFI, brute force, file upload, etc.
  • Identify the possible source of the attack
  • Identifying a potential vulnerability in the web application that constitutes an entry point for an attack.
  • Common tools and techniques used to detect attacks – manual and automated

This course is suitable for people who:

  • Cyber ​​security professionals who want to learn how to detect attacks from logs.
  • Network administrators who want to develop basic log analysis skills.
  • Application developers – who want to quickly detect security problems that may occur.
  • Students who want to increase their knowledge in log analysis.

Details of the course Log analysis – Detecting Web Attacks.

Course headings

 Log analysis - Detecting Web Attacks.

Log analysis course prerequisites – Detecting Web Attacks.

  • Basics of linux command line.
  • Installing & operating Virtualbox or similar virtualization platforms.

Course images

Log analysis - Detecting Web Attacks.

Sample video of the course

Installation guide

After Extract, view with your favorite Player.

Subtitle: English

Quality: 720p

download link

Download part 1 – 1 GB

Download part 2 – 1 GB

Download part 3 – 432 MB

File(s) password: www.downloadly.ir

File size

2.4 GB

Sharing is caring:

Leave a Comment (Please sign to comment)