Overview
Students will correlate server logs, system logs, and application logs to determine what level of access was obtained to the system and what program was used to provide access.

Learning Partner

CYBRScore
Cybersecurity Technical Hands-on Labs