Module 4: Logging and Monitoring
When a problem occurs, having the right data to trace the issue back to the source is key to incident response. But which data should be collected? In this course, we explore not only what data should be collected, but also different ways to view those logs in Windows and Linux systems. Then we dig into log aggregation, the Elastic Stack, SIEMs, and a variety of network management tools.