Overview
Students will correlate server logs, system logs, and application logs to determine what level of access was obtained to the system and what program was used to provide access.
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468e88ae0c3d3bf51ced5c3_Log_Correlation_and_Analysis_.jpeg)
Learning Partner
![CYBRScore](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/64744bb1dac63cc4698c7781_browse-cybrscore-logo.png)
CYBRScore
Cybersecurity Technical Hands-on Labs