Time
2 hours 19 minutes
Difficulty
Beginner
CEU/CPE
3

Video Transcription

00:00
Hello, everyone. And welcome to the course. It'd finally, but thanks. True logs.
00:04
I'm gonna go. Vera in Nairobi, Instructor. In this course.
00:08
Before we start, let me introduce myself.
00:11
Hi, I'm negotiator.
00:14
I have a vegetable degree. Electro engineering in the graduate study in cyber security.
00:19
I also have so much certifications.
00:22
I have been working with my chief for around 15 years.
00:26
I'm especially about technology, especially things related to network insecurity.
00:32
And I asked, believe their education and knowledge have the part to change people's lives.
00:37
You have an idea about what? Were you going to talk in this course? First, let's check this to line off a passion with several logs.
00:45
Can you identify which one is suspicious?
00:48
Don't worry. If you do not have experience in longer than it is
00:52
bus, let's analyze this log.
00:56
Here we have the sauce off the requests. The remote I p
01:00
after we have the GOP method
01:04
and the last is the web. Several result.
01:08
Both have the same I P address and they did you eat my food?
01:12
The difference is the web. Several result.
01:15
During this course, you're gonna see that the 200 means okay and 404 means not found,
01:23
although there is another difference in the logline.
01:26
The requested file
01:29
The first file is an image.
01:30
The second is a well no leaks fire that contains all the password from the users.
01:37
This looks suspicious
01:38
why someone would ask for their passwords
01:42
after the previous is lied. Maybe rethinking we should take this course.
01:47
You should take this course if you are a Web development.
01:51
0 70 Mr. That wants you to stand with application attacks.
01:56
Sock analysts interested in the center where application logs
02:00
our senior demonstrator who wants to be a bear correlation rules
02:06
and energy professional. Who wants to this it more about Weber, Tex.
02:09
To be susceptible discourse. Some of the prerequisites are
02:15
basic oppositional season. And be sure excuse
02:19
basically understand Off T c p I p h A T P in Web applications.
02:23
Basic understand about Web application, Tex
02:28
and basically observant Michelle Excuse in Lenox and Windows.
02:32
This course will use presentations and quizzes
02:38
during this course. We're gonna use a lab, and we perform some attacks in this lab
02:44
that that's regenerated logs, and we analyze them
02:47
so each attack will have its own logs
02:52
the cost is stoked. You will be
02:53
review of application and infrastructure.
02:58
Review the Web. Several logs
03:00
simulate some attacks
03:01
like a scary junction and cross site scripting to do the rate logs
03:07
and uses Log Student Friday TEX.
03:09
To make things clear, let's talk about course. Objectives and goals.
03:15
This course was were to give you a good in the ST off Web. Seven Logs
03:19
had used his logs to identify Web application attacks.
03:23
The summary is Understand a Web seven Log in deeds. Information.
03:28
Two. In the price of special activities and whoever vacation attacks
03:34
they go is there. You can get some logs and say, if there is a suspicion behavior after log analysis
03:40
In this first video, we talked about introduction off the course
03:45
cause description in the structure
03:47
course of Jack Chiefs and goes
03:51
the next video. We start the review.
03:53
We start with Web application architecture ER, followed by
03:58
WWW and Web service and Officer http and HTML

Up Next

Identifying Web Attacks Through Logs

This course will review web application infrastructure, web servers, and the logs associated with them. We will also simulate 10 attack scenarios and identify the attack through logs that are generated by the web server.

Instructed By

Instructor Profile Image
Igor Vieira
Information Security Analyst
Instructor