Identifying Web Attacks Through Logs

0
Language

Level

Beginner

Access

Paid

Certificate

Paid

Log analysis involves reviewing and evaluating system activities to help mitigate risks. If you’re training to be a SOC Analyst, then you’ll need log analysis training. This course will review web application infrastructure, web servers, and logs. You will explore attack scenarios and identify the attack through logs generated by the web server.

Add your review

Course Description

An Akamai Report from 2018 described SQLi (SQL Injection), LFI (Local File Injection) and XSS (Cross-Site Scripting) as the most common web attacks.

Course Goals

Maintaining compliance with internal cybersecurity policies and external regulations and audits

To understand and mitigate data breaches and other types of security incidents

If you are interested in learning more about log analysis, our Log Analysis training course including lab activities is a great place to start. It’s easy to enroll, just click on the Register button in the top right corner of this screen to begin.

Module 1: Introduction and Review

Module 2: Identifying Web Attacks Through Logs

×

    Your Email (required)

    Report this page
    Identifying Web Attacks Through Logs
    Identifying Web Attacks Through Logs
    LiveTalent.org
    Logo
    Skip to content