YoVDO

Log4j Vulnerability Lab: Video Walkthrough

Offered By: Pluralsight

Tags

Cybersecurity Courses Network Traffic Analysis Courses

Course Description

Overview

This video walkthrough course is designed to be a companion video for the Log4j Vulnerability Lab: Emulation and Detection.

This video walkthrough course is designed to be a companion video for the Log4j Vulnerability Lab: Emulation and Detection. In this course, Logj4j Vulnerability Lab: Video Walkthrough, you will learn foundational knowledge of/gain the ability to emulate the log4j vulnerability. First, you will learn to set up the detection mechanisms. Next, you will discover exploitation techniques and the components involved from an attacker’s perspective. Finally, you will explore how to analyze artifacts from the network traffic. When you’re finished with this course, you will have the skills and knowledge of the Log4j vulnerability needed to detect and analyze these threats in your own environment.

Syllabus

  • Course Overview 0mins
  • Log4j Vulnerability Lab: Video Walkthrough 21mins

Taught by

Brandon DeVault

Related Courses

Software Defined Networking
Georgia Institute of Technology via Coursera
Hands-On Labs in Google Cloud for Networking Engineers
Google Cloud via Coursera
Web Services Analysis With Python & Wireshark
Coursera Project Network via Coursera
REST API Testing, Automation using POSTMAN
Udemy
Network Analysis with Arkime
Pluralsight