Udemy Log analysis - Detecting Web Attacks
2.71 GB | 00:09:38 | mp4 | 1280X720 | 16:9
Genre:eLearning |
Language:
English
Files Included :
1 - Introduction (70.08 MB)
2 - Course Structure (27.84 MB)
1 - Introduction to Log Analysis (92.81 MB)
2 - Typical use cases of Log Analysis (24.29 MB)
3 - General web application architecture (18.42 MB)
4 - HTTP Status codes & module outro (38.86 MB)
1 - Introduction to web servers (38.24 MB)
10 - SSH & FTP services logging & Module Outro (37.07 MB)
2 - The Apache web server (133.6 MB)
3 - Practical - Apache web server on Ubuntu server (42.58 MB)
4 - Practical - Apache web server on Fedora server (25.3 MB)
5 - The Nginx web server (49.78 MB)
6 - Practical - Nginx web server on Ubuntu server (11.62 MB)
7 - Practical - Nginx web server on Fedora server (9.91 MB)
8 - Microsoft IIS web server (40.55 MB)
9 - Practical - Microsoft IIS web server (10.59 MB)
1 - Module Introduction (11.02 MB)
10 - Generating benign HTTP web traffic logs (50.51 MB)
11 - Introduction to generation of malicious traffic (3.03 MB)
12 - Generating traffic using nitko & nmap scanners (40.44 MB)
13 - Generating traffic using OWASP ZAP, sqlmap & Commix (62.96 MB)
14 - Generating form bruteforce & LFI attack traffic (34.77 MB)
15 - Generating file upload vulnerabilities traffic (25.77 MB)
16 - Bruteforce SSH & FTP services (48.52 MB)
17 - Module Recap & End (15.29 MB)
2 - Metasploitable Vulnerable machine setup (59.25 MB)
3 - Importing Kali Linux VM in Virtualbox (38.13 MB)
4 - Virtualbox - Bridged mode (17.75 MB)
5 - Virtualbox - Host Only mode (35.8 MB)
6 - Virtualbox - NAT mode (35.41 MB)
7 - Virtualbox - NAT Network mode (30.98 MB)
8 - Generating test traffic for SSH server (39.78 MB)
9 - Generating test traffic for FTP server (34.39 MB)
1 - Module Introduction (12.64 MB)
10 - Linking cloud-based tools with Ubuntu server (70.14 MB)
11 - Setting up analysis filter for cloud-based log analysis tool (69.01 MB)
12 - Setting up Log analysis tool on local system (62.59 MB)
13 - Tool demonstration - 1 (130.68 MB)
14 - Tool demonstration - 2 (98.77 MB)
15 - Assignment Task (22.88 MB)
16 - Module Recap & End (31.35 MB)
2 - Theoretical concepts of log analysis - 1 (54.01 MB)
3 - Theoretical concepts of log analysis - 2 (16.86 MB)
4 - General architecture and tools of the trade (55.22 MB)
5 - Log analysis in a text editor (157.63 MB)
6 - Demo - Installation of Ubuntu server on Virtualbox (78.04 MB)
7 - Installation of GoAccess tool on Ubuntu server (53.18 MB)
8 - Importing logs to Ubuntu server & loading in GoAccess (17.58 MB)
9 - Viewing logs in GoAccess and result discussion (102.93 MB)
1 - Module Introduction (11.14 MB)
10 - Logging Best practices - 5 (17.39 MB)
11 - Logging Best practices - 6 (17.81 MB)
12 - Logging Best practices - 7 (55.37 MB)
13 - Logging Best practices - 8 (19.91 MB)
14 - Logging Best practices - 9 (20.01 MB)
15 - Module & Course End (23.78 MB)
2 - Threat agents to logging (42.06 MB)
3 - Insufficient logging attributes (26.29 MB)
4 - Benefits of security logging (14.89 MB)
5 - Logging Best practices - Introduction (19.74 MB)
6 - Logging Best practices - 1 (40.26 MB)
7 - Logging Best practices - 2 (74.34 MB)
8 - Logging Best practices - 3 (61.9 MB)
9 - Logging Best practices - 4 (42.31 MB)
[center]
Screenshot
[/center]
Коментарии
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.