Identifying Web Attacks Through Logs
Log analysis involves reviewing and evaluating system activities to help mitigate risks. If you’re training to be a SOC Analyst, then you’ll need log analysis training. This course will review web application infrastructure, web servers, and logs. You will explore attack scenarios and identify the attack through logs generated by the web server.
An Akamai Report from 2018 described SQLi (SQL Injection), LFI (Local File Injection) and XSS (Cross-Site Scripting) as the most common web attacks.
Maintaining compliance with internal cybersecurity policies and external regulations and audits
To understand and mitigate data breaches and other types of security incidents
If you are interested in learning more about log analysis, our Log Analysis training course including lab activities is a great place to start. It’s easy to enroll, just click on the Register button in the top right corner of this screen to begin.
Module 1: Introduction and Review
Module 2: Identifying Web Attacks Through Logs