Course Search

Log and Threat Analysis

Course Description

Network hosts, such as firewalls, switches, routers, servers, workstations and intrusion detection/prevention systems, generate quite a bit of logging data. These data can, and should, be used to analyze network performance, security vulnerabilities, breaches and anomalous activity. Discover how security information and event management (SIEM) tools are used to monitor, analyze and report about logged data, and use the information to make informed decisions based on actual log data.

This course is not offered in the current semester.
Looking for a different semester?


Ready to register?
Note the CRN number of the class you want to take, then follow our registration steps.

Looking for a different semester? Start over.