- Course
Specialized Hunts: Threat Hunting within Web Servers
This course will teach you how to identify, analyze, and mitigate web server-based threats, enhancing your ability to protect critical infrastructure from attacks.
- Course
Specialized Hunts: Threat Hunting within Web Servers
This course will teach you how to identify, analyze, and mitigate web server-based threats, enhancing your ability to protect critical infrastructure from attacks.
Get started today
Access this course and other top-rated tech content with one of our business plans.
Try this course for free
Access this course and other top-rated tech content with one of our individual plans.
This course is included in the libraries shown below:
- Security
What you'll learn
Web servers are often the target of sophisticated cyberattacks, making it crucial to understand how to detect and mitigate vulnerabilities. In this course, Specialized Hunts: Threat Hunting within Web Servers, you’ll learn to identify and analyze threats targeting web server environments. First, you’ll explore how to recognize common SQL injection attempts in web server logs. Next, you’ll discover how to perform analysis on remote command execution requests. Finally, you’ll learn how to detect brute force attempts against a web server and how to use Zeek HTTP logs to filter for web shell uploads. When you’re finished with this course, you’ll have the skills and knowledge needed to identify and detect common web server attacks and provide insight to your organization's ability to defend against sophisticated threats.