This course takes a deeper look at advanced logging capabilities available to the SOC and how to investigate a compromised system.
Interested in attending? Have a suggestion about running this event near you?
Register your interest now
This course takes a deeper look at advanced logging capabilities available to the SOC and how to investigate a compromised system.