Examine Log Files to Block Bad Actors

In this IT Pro Challenge lab, learners examine log files for evidence of unauthorized access attempts and learn the skills needed to implement defenses against password attacks. Skills learned in this lab are foundational to forensic investigation and for the proactive defense of Linux systems. You will have hands-on with SSH and access control files.

1

H

Time

beginner

i
Designed for learners who have no prior work experience in IT or Cybersecurity, but are interested in starting a career in this exciting field.
Experience Level

0

i

Earn qualifying credits for certification renewal with completion certificates provided for submission.
CEU's

About This Virtual Lab

Learning Partner
Skillable
Skillable
Ready-built content across a variety of topics and technologies