Overview

Students will correlate server logs, system logs, and application logs to determine what level of access was obtained to the system and what program was used to provide access.