YoVDO

Log4j Vulnerability: What You Should Know

Offered By: Pluralsight

Tags

Cybersecurity Courses Log4Shell Courses

Course Description

Overview

This course is a Q&A session discussing the Log4j vulnerability, known as Log4Shell.

This course covers a Q&A session discussing the Log4j vulnerability, known as Log4Shell. In this course, Log4j Vulnerability: What You Should Know, we will cover what the vulnerability is, why it’s such a critical and widespread vulnerability that can exist in a multitude of systems, and how to identify if you’ve been affected.

Syllabus

  • Log4j Vulnerability: What You Should Know 8mins
  • Additional Resources 0mins

Taught by

Bri Andersen

Related Courses

Mitigating Log4Shell and Similar Vulnerabilities Using Cloud Services
ChariotSolutions via YouTube
Log4Shell Vulnerability - Bugcrowd Security Flash
Bugcrowd via YouTube
Log4Shell - The Worst Java Vulnerability in Years
Bugcrowd via YouTube
Keep Your Dependencies in Check
Devoxx via YouTube
Secure Coding Guidelines for Java SE - Overview and Best Practices
Java via YouTube