SecOps Tools and 2021 Security Incidents: Log4Shell Exploit
Cybersecurity
| Intermediate
- 12 videos | 1h 4m 6s
- Includes Assessment
- Earns a Badge
Cybersecurity professionals are often tasked with studying breaches that have impacted other organizations to protect their assets. This knowledge helps identify potential threats and understand how threat actors operate in a modern environment. In this course, we begin by exploring the background of the Log4Shell exploit and how it was discovered. We then explore how the exploit was disclosed and various tools that can be used to scan for the vulnerability. We even look at how to conduct the exploit ourselves. Finally, we discuss the patches and response to the exploit by the open-source community and the long-term political and cybersecurity fallout. Upon completion of this course, you'll be able to describe the tools used to detect and conduct a Log4Shell exploit.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseOutline the background of the attack and what made it possibleOutline how the attack was discovered and disclosedIdentify the tools available to detect and exploit log4j vulnerabilitiesUse metasploit to scan for log4j vulnerable serversScan your network using log4j-scan
-
Configure a netcat listener to exploit log4jUse the python web server to distribute filesConduct a full attack using netcat, python web server, and log4shellRecognize the patches used in the response undertaken by the open-source communityRecognize the political and cybersecurity community fallout from the log4j eventSummarize the key concepts covered in this course
IN THIS COURSE
-
58s
-
5m 53s
-
5m 5s
-
5m 24s
-
6m 56s
-
8m 31s
-
5m 14s
-
4m 35s
-
8m 58s
-
5m 50s
-
5m 43s
-
1m 1s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.