Log Correlation and Analysis

Students will correlate server logs, system logs, and application logs to determine what level of access was obtained to the system and what program was used to provide access.

Overview

Students will correlate server logs, system logs, and application logs to determine what level of access was obtained to the system and what program was used to provide access.

Learning Partner
CYBRScore
CYBRScore
Cybersecurity Technical Hands-on Labs