Course Listing
Spring 2026 Semester Courses
Log and Threat Analysis
Course Description
Network hosts, such as firewalls, switches, routers, servers, workstations and intrusion detection/prevention systems, generate quite a bit of logging data. These data can, and should, be used to analyze network performance, security vulnerabilities, breaches and anomalous activity. Discover how security information and event management (SIEM) tools are used to monitor, analyze and report about logged data, and use the information to make informed decisions based on actual log data.
2 courses found
| Course | CRN | Seats Open | Term | Credit | Dates | Days | Times | Room | Delivery |
|---|---|---|---|---|---|---|---|---|---|
Course: 151-102-622Log and Threat Analysis |
CRN: 20960 |
Seats: 8 |
Term: Spring Term 2 |
Credit: 3 |
Dates: 03/25/26-05/13/26 |
Days: WednesdayW |
Times: 06:00pm-09:50pm |
Room: ZOOM | Delivery: Hybrid Online |
Course: 151-102-721Log and Threat Analysis |
CRN: 21466 |
Seats: 8 |
Term: Spring Term 2 |
Credit: 3 |
Dates: 03/25/26-05/13/26 |
Days: WednesdayW |
Times: 06:00pm-09:50pm |
Room: L116  | Delivery: Hybrid Course |
Loading Course...
Understanding Course Search Results
- Classes that are currently full are listed in italics. Waitlists for these courses may be available. View waitlists when you register online, or contact Registration at 262.691.5578.
- + = Course restriction applies, click on the course for more information.
- Days of the week abbreviations: M - Monday; T - Tuesday; W - Wednesday; Th - Thursday; F - Friday; S - Saturday; Su - Sunday
Ready to register?
Note the CRN number of the class you want to take, then follow our registration steps.
Didn't find what you were looking for?
Try another search. Use our handy filters to set the semester, delivery type, availability and more.