2 hours 5 minutes
welcome back to the course, but
now it's time to say we're done
after the last video where we talked about other sources of logs like I, P s I. D s and Web application firewall.
In this video,
we'll do a course summary.
This was a basic course.
The main objective of this course was to introduce you to log analysis. And since today Web applications are present in our lives,
this is a good way to start doing log analysis.
This course was built based off of the routines of offenders and also sock analysts.
Let's do a brief review of the course topics.
We had two modules in our course.
The first was an introduction and a review.
We started with a course introduction, followed by a Web application review
where we talked about Web application components like the Web server and clients.
After we talked about a really important component
the Web server,
we talked about Apache, N G, I N X, and I. I s
also in this lesson. We talked about Web server logs
to conclude module one. We gave some advice on how to perform a good analysis, and we also touched on some log analysis, mistakes or errors.
Module two was the module for log analysis.
The first topic of module to was Web application attacks.
We discussed vulnerability attacks in the O Wasp Top 10 project.
In this course, we used the 2017 version of the O Wasp Top 10 projects.
An important thing here is even if the WASP Top 10 launched a new version, the information about these attacks won't change.
Some vulnerabilities and attacks have become less popular, and maybe the new type of tax can be found more.
But that's why it's important to understand Web server logs.
After this introduction, we started talking about the attacks,
vulnerability scans, brute force attacks, SQL injection file inclusion, cross site scripting and cross site request forgery.
For each of these attacks, we gave some directions on how to identify them. For example, the user agent can help a lot. But don't forget that http requests can be crafted.
Remember to understand what the log means, what the log wants to say to you.
Remember the questions who, what and when.
Look for key components of the log like the I P address.
And don't worry if you don't understand all the log fields,
log analysis skills improve with practice.
The more log analysis you do, the better you'll be.
And after all these attacks and log analysis, we talked about TCP and http Flood, and we discussed how to identify them
and to finish the course. We talked about two really important tools that help stock analysts. I ps slash i ds and UAF
to conclude some final words.
Many helped the course architect Igor Vieira during this course, but he would like to mention three teaching assistance that helped him with this class.
He really appreciates the help.
Ah, final thanks to all the Sai Buri staff. And now
thank you for watching this course. Igor Vieira really enjoyed the time spent creating this course.
We hope you really enjoyed this course and we hope it improved your knowledge and motivated you to continue learning
to continue learning. Please check out the cyber re catalog. There are many great courses.
If you have any questions or doubts,
please contact the course architect Igor Vieira.
Thank you and we'll see you in the next course
Recover from SQL Injection Attack
After identifying a SQL Injection attack, students will learn about parameterized queries in back-end web ...
Become a SOC Analyst - Level 3
This Career Path is for a Security Operations Center Analyst (SOC Analyst). This particular Career ...