Stories through Logging - It Was the Best of Logs, It Was the Worst of Logs
Offered By: YouTube
Course Description
Overview
Explore the importance of logging in cybersecurity through this 46-minute conference talk from Converge 2017. Dive into the world of logs, from their origins to their crucial role in identifying security threats. Learn why seemingly boring log files are essential for detecting issues like Denial of Service attacks and DNS problems. Gain key takeaways on how to effectively utilize logs for improved security posture and incident response. Discover the story behind logs and understand why every cybersecurity professional should care about proper logging practices.
Syllabus
Introduction
Story
Its the worst of logs
Where do logs come from
The key takeaway
Today in the logs
A boring log file
What is a log file
The log file
Why you should care
Denial of Service
DNS
Logs
Takeaway
Related Courses
Implementing DNS in Microsoft Windows ServerMicrosoft via edX Networking for Web Developers
Udacity Microsoft Windows Server 2012 Fundamentals: DNS
Microsoft via edX Windows Server 2016: Basic Networking
Microsoft via edX The Bits and Bytes of Computer Networking
Google via Coursera