Hello, everyone. And welcome to the course. It'd finally, but thanks. True logs.
I'm gonna go. Vera in Nairobi, Instructor. In this course.
Before we start, let me introduce myself.
I have a vegetable degree. Electro engineering in the graduate study in cyber security.
I also have so much certifications.
I have been working with my chief for around 15 years.
I'm especially about technology, especially things related to network insecurity.
And I asked, believe their education and knowledge have the part to change people's lives.
You have an idea about what? Were you going to talk in this course? First, let's check this to line off a passion with several logs.
Can you identify which one is suspicious?
Don't worry. If you do not have experience in longer than it is
bus, let's analyze this log.
Here we have the sauce off the requests. The remote I p
after we have the GOP method
and the last is the web. Several result.
Both have the same I P address and they did you eat my food?
The difference is the web. Several result.
During this course, you're gonna see that the 200 means okay and 404 means not found,
although there is another difference in the logline.
The first file is an image.
The second is a well no leaks fire that contains all the password from the users.
This looks suspicious
why someone would ask for their passwords
after the previous is lied. Maybe rethinking we should take this course.
You should take this course if you are a Web development.
0 70 Mr. That wants you to stand with application attacks.
Sock analysts interested in the center where application logs
our senior demonstrator who wants to be a bear correlation rules
and energy professional. Who wants to this it more about Weber, Tex.
To be susceptible discourse. Some of the prerequisites are
basic oppositional season. And be sure excuse
basically understand Off T c p I p h A T P in Web applications.
Basic understand about Web application, Tex
and basically observant Michelle Excuse in Lenox and Windows.
This course will use presentations and quizzes
during this course. We're gonna use a lab, and we perform some attacks in this lab
that that's regenerated logs, and we analyze them
so each attack will have its own logs
the cost is stoked. You will be
review of application and infrastructure.
Review the Web. Several logs
simulate some attacks
like a scary junction and cross site scripting to do the rate logs
and uses Log Student Friday TEX.
To make things clear, let's talk about course. Objectives and goals.
This course was were to give you a good in the ST off Web. Seven Logs
had used his logs to identify Web application attacks.
The summary is Understand a Web seven Log in deeds. Information.
Two. In the price of special activities and whoever vacation attacks
they go is there. You can get some logs and say, if there is a suspicion behavior after log analysis
In this first video, we talked about introduction off the course
cause description in the structure
course of Jack Chiefs and goes
the next video. We start the review.
We start with Web application architecture ER, followed by
WWW and Web service and Officer http and HTML