- Course
- Security
Specialized Hunts: Threat Hunting within Web Servers
This course will teach you how to identify, analyze, and mitigate web server-based threats, enhancing your ability to protect critical infrastructure from attacks.
What you'll learn
Web servers are often the target of sophisticated cyberattacks, making it crucial to understand how to detect and mitigate vulnerabilities. In this course, Specialized Hunts: Threat Hunting within Web Servers, you’ll learn to identify and analyze threats targeting web server environments. First, you’ll explore how to recognize common SQL injection attempts in web server logs. Next, you’ll discover how to perform analysis on remote command execution requests. Finally, you’ll learn how to detect brute force attempts against a web server and how to use Zeek HTTP logs to filter for web shell uploads. When you’re finished with this course, you’ll have the skills and knowledge needed to identify and detect common web server attacks and provide insight to your organization's ability to defend against sophisticated threats.
Table of contents
About the author
Corey is a cybersecurity expert with years of experience. He specializes in threat analysis and red teaming, helping organizations identify vulnerabilities through simulated attacks.