MP4 | Video: h264, 1280×720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + srt | Duration: 10 lectures (1h 33m) | Size: 451 MB
This course helps you easy way to identify if any of your applications are using Log4j2 and how to fix it
What you’ll learn
Who needs to understand about LOG4J2 Vulnerability
Fixing issues which can expose you system which has Log4j2 installed and used.
Understanding Log4j2 issue
Identifying Log4j2 if its installed on your system
Guys, this is Venkat Raman V, welcome to my course on Verifying Log4j2 Vulnerability and Applying Fixes, in this course helps you easy way to identify if any of your applications are using Log4j2 and how to fix it.
Important Information about this training
No reading from presentation, the architecture, the diagrams are self made all those words in your PDF too.
Only on Linux prod like environment using SSH terminal no GUI (only for browser, windows o/s will be used)
No Linux experience needed,
Commands and method of execution is given in the video & PDF is attached for the commands,
Just follow the video and work in your environment.
About The Course
A critical exploit in widespread Java library has been found, disrupting much of the internet as server admins scramble to fix it. The vulnerable component, log4j, is used everywhere as an included library, so you will need to check your servers and make sure they’re updated.
As far as exploits go, the log4j vulnerability is by far one of the worst in the last few years, scoring a rare 10/10 on the CVSS scale, and is going to haunt the entire internet for many years to come.
What’s worse is that log4j isn’t an application—it’s an open source library used by many other applications. You may not have it installed directly; it might be included in other .jar files, or installed by other applications as a dependency.
Who this course is for