Log and Threat Analysis
Course Description
Network hosts, such as firewalls, switches, routers, servers, workstations and intrusion detection/prevention systems, generate quite a bit of logging data. These data can, and should, be used to analyze network performance, security vulnerabilities, breaches and anomalous activity. Discover how security information and event management (SIEM) tools are used to monitor, analyze and report about logged data, and use the information to make informed decisions based on actual log data.