Overview
Students will correlate server logs, system logs, and application logs to determine what level of access was obtained to the system and what program was used to provide access.
Learning Partner
CYBRScore
Cybersecurity Technical Hands-on Labs