A centralized logging system is just one a part of an entire logging infrastructure. In order to correctly defend an IT infrastructure from malicious actors, helpful info must be extracted from that log knowledge. Throughout this course, we are going to look at numerous logging codecs and sources, and the way correct aggregation and correlation methods might help pull that actionable intelligence that’s required for correct countermeasure development. In addition, we’ll take a look at numerous instruments that can be utilized all through the method and the significance of steady monitoring of not solely logs and alerts, but additionally countermeasure effectiveness.
Instructor: Brian Olliff
Duration: 15 Lessons ( 3h 42m )
Size: 3.21 GB