| The following warnings occurred: | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Warning [2] Undefined array key "extra" - Line: 100 - File: inc/plugins/google_seo/url.php PHP 8.1.33 (Linux)
|
![]() |
|
Udemy Log analysis - Detecting Web Attacks - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: Udemy Log analysis - Detecting Web Attacks (/Thread-Udemy-Log-analysis-Detecting-Web-Attacks) |
Udemy Log analysis - Detecting Web Attacks - AD-TEAM - 09-30-2024 ![]() 2.71 GB | 00:09:38 | mp4 | 1280X720 | 16:9 Genre:eLearning |Language:English
Files Included :
1 - Introduction (70.08 MB) 2 - Course Structure (27.84 MB) 1 - Introduction to Log Analysis (92.81 MB) 2 - Typical use cases of Log Analysis (24.29 MB) 3 - General web application architecture (18.42 MB) 4 - HTTP Status codes & module outro (38.86 MB) 1 - Introduction to web servers (38.24 MB) 10 - SSH & FTP services logging & Module Outro (37.07 MB) 2 - The Apache web server (133.6 MB) 3 - Practical - Apache web server on Ubuntu server (42.58 MB) 4 - Practical - Apache web server on Fedora server (25.3 MB) 5 - The Nginx web server (49.78 MB) 6 - Practical - Nginx web server on Ubuntu server (11.62 MB) 7 - Practical - Nginx web server on Fedora server (9.91 MB) 8 - Microsoft IIS web server (40.55 MB) 9 - Practical - Microsoft IIS web server (10.59 MB) 1 - Module Introduction (11.02 MB) 10 - Generating benign HTTP web traffic logs (50.51 MB) 11 - Introduction to generation of malicious traffic (3.03 MB) 12 - Generating traffic using nitko & nmap scanners (40.44 MB) 13 - Generating traffic using OWASP ZAP, sqlmap & Commix (62.96 MB) 14 - Generating form bruteforce & LFI attack traffic (34.77 MB) 15 - Generating file upload vulnerabilities traffic (25.77 MB) 16 - Bruteforce SSH & FTP services (48.52 MB) 17 - Module Recap & End (15.29 MB) 2 - Metasploitable Vulnerable machine setup (59.25 MB) 3 - Importing Kali Linux VM in Virtualbox (38.13 MB) 4 - Virtualbox - Bridged mode (17.75 MB) 5 - Virtualbox - Host Only mode (35.8 MB) 6 - Virtualbox - NAT mode (35.41 MB) 7 - Virtualbox - NAT Network mode (30.98 MB) 8 - Generating test traffic for SSH server (39.78 MB) 9 - Generating test traffic for FTP server (34.39 MB) 1 - Module Introduction (12.64 MB) 10 - Linking cloud-based tools with Ubuntu server (70.14 MB) 11 - Setting up analysis filter for cloud-based log analysis tool (69.01 MB) 12 - Setting up Log analysis tool on local system (62.59 MB) 13 - Tool demonstration - 1 (130.68 MB) 14 - Tool demonstration - 2 (98.77 MB) 15 - Assignment Task (22.88 MB) 16 - Module Recap & End (31.35 MB) 2 - Theoretical concepts of log analysis - 1 (54.01 MB) 3 - Theoretical concepts of log analysis - 2 (16.86 MB) 4 - General architecture and tools of the trade (55.22 MB) 5 - Log analysis in a text editor (157.63 MB) 6 - Demo - Installation of Ubuntu server on Virtualbox (78.04 MB) 7 - Installation of GoAccess tool on Ubuntu server (53.18 MB) 8 - Importing logs to Ubuntu server & loading in GoAccess (17.58 MB) 9 - Viewing logs in GoAccess and result discussion (102.93 MB) 1 - Module Introduction (11.14 MB) 10 - Logging Best practices - 5 (17.39 MB) 11 - Logging Best practices - 6 (17.81 MB) 12 - Logging Best practices - 7 (55.37 MB) 13 - Logging Best practices - 8 (19.91 MB) 14 - Logging Best practices - 9 (20.01 MB) 15 - Module & Course End (23.78 MB) 2 - Threat agents to logging (42.06 MB) 3 - Insufficient logging attributes (26.29 MB) 4 - Benefits of security logging (14.89 MB) 5 - Logging Best practices - Introduction (19.74 MB) 6 - Logging Best practices - 1 (40.26 MB) 7 - Logging Best practices - 2 (74.34 MB) 8 - Logging Best practices - 3 (61.9 MB) 9 - Logging Best practices - 4 (42.31 MB)
Screenshot
![]() |