CFR: Security Assessment, Data Collection, and Log Analysis
In this course, you'll continue developing your cybersecurity skills by implementing cybersecurity auditing, implementing a vulnerability management plan, assessing vulnerabilities, and conducting penetration testing. Then, you'll collect cybersecurity intelligence from both network-based and host-based sources. You'll also analyze log data using common Windows and Linux tools, as well as security information and event management (SIEM) tools.
This is the third course in a multi-course Specialization.
All of the courses in this Specialization require that you purchase the CFR-410 LogicalLABS…
Watch on Coursera ↗
(saves to browser)
DeepCamp AI