Overview
Learn the techniques used to perform basic operations on dates and times. Timestamps are the part of network monitoring. For example: Events happening outside of regular office hours can be an indicator of malicious activity. Logs that are beyond a record retention limit could be discarded. It's important for this information to be accurate.
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468eec1b3a57bbf99981602_Lab_Cards406.png)
Learning Partner
Skillable
Ready-built content across a variety of topics and technologies