Teaching Cybersecurity with the Arkansas Range

This series will cover the eight curriculum modules developed through a partnership with ADE, UCA, Metova Federal, and the National Integrated Cyber Education Research Center. It is the intent of the course to present learners with a series of real-world challenges that will illustrate the practical, operational, and ethical issues of working in this kind of space.

Module 4: Logging and Monitoring

When a problem occurs, having the right data to trace the issue back to the source is key to incident response. But which data should be collected? In this course, we explore not only what data should be collected, but also different ways to view those logs in Windows and Linux systems. Then we dig into log aggregation, the Elastic Stack, SIEMs, and a variety of network management tools.


Lesson One

Introduction to Logging and Monitoring 
(Segment 1 of 5)
Logging vs. Alerting 
(Segment 2 of 5)
Lab 1 - Getting Logs  
(Segment 3 of 5)

Lesson Two

Shipping Logs and Aggregation
(Segment 4 of 5)
(Segment 5 of 5)