From the course: ISC2 Systems Security Certified Practitioner (SSCP) (2024) Cert Prep

Unlock this course with a free trial

Join today to access over 24,600 courses taught by industry experts.

Visualization and reporting

Visualization and reporting

- [Instructor] Security monitoring efforts generate a large amount of information that may be useful to analysts investigating a security incident or simply monitoring enterprise cybersecurity. Machine and application logs, packet dumps, and the output of security devices all play an important role in security event data analysis. As you respond to a security event, you'll need to gather and analyze information from a wide variety of sources. You've already learned how server and desktop operating systems generate massive amounts of log information that may contain valuable security data. These log records provide valuable insight into the activities that occur within systems and applications and they're particularly useful when reconstructing the sequence of events that took place during a security incident. In my course covering SSCP domain six, network and communication security, you'll learn more about network…

Contents