YoVDO

Log4j Vulnerability Lab: Video Walkthrough

Offered By: Pluralsight

Tags

Cybersecurity Courses Network Traffic Analysis Courses

Course Description

Overview

This video walkthrough course is designed to be a companion video for the Log4j Vulnerability Lab: Emulation and Detection.

This video walkthrough course is designed to be a companion video for the Log4j Vulnerability Lab: Emulation and Detection. In this course, Logj4j Vulnerability Lab: Video Walkthrough, you will learn foundational knowledge of/gain the ability to emulate the log4j vulnerability. First, you will learn to set up the detection mechanisms. Next, you will discover exploitation techniques and the components involved from an attacker’s perspective. Finally, you will explore how to analyze artifacts from the network traffic. When you’re finished with this course, you will have the skills and knowledge of the Log4j vulnerability needed to detect and analyze these threats in your own environment.

Syllabus

  • Course Overview 0mins
  • Log4j Vulnerability Lab: Video Walkthrough 21mins

Taught by

Brandon DeVault

Related Courses

AWS Network – Monitoring and Troubleshooting
Amazon Web Services via AWS Skill Builder
VPC Flow Logs - Analyzing Network Traffic
Google Cloud via Coursera
Hands-On Labs in Google Cloud for Networking Engineers
Google Cloud via Coursera
Wireshark: Packet Loss and Recovery
LinkedIn Learning
Getting Started with Wireshark
Pluralsight