Course Description
Windows System Security Auditing 3-Day Course
The number, volume, and variety of computer security logs have increased greatly, which has created the need for a greater understanding of computer security log management. Log management is an essential component for an organization to ensure that computer security records are stored in sufficient detail for an appropriate period of time. Routine log analysis is beneficial for identifying security incidents, policy violations, fraudulent activity, and operational problems. Logs are also useful when performing auditing and forensic analysis, supporting internal investigations, establishing baselines, and identifying operational trends and long-term organizational problems. Lunarline’s 3-day, hands-on course will assists organizations in establishing log management and auditing policies and procedures to discover and handle incidents efficiently and effectively. Students will learn log management, particularly skills for analyzing system related log data. Students will gain an understanding of log analysis tools and technologies available for system administrators through hands-on lab work.
Course includes the following takeaway items: a printed training book and a CD that includes reference materials pertaining to the course.
NICE Work Roles
System Administrator
Responsible for setting up and maintaining a system or specific components of a system (e.g. for example, installing, configuring, and updating hardware and software; establishing and managing user accounts; overseeing or conducting backup and recovery tasks; implementing operational and technical security controls; and adhering to organizational security policies and procedures).
Information Systems Security Manager
Responsible for the cybersecurity of a program, organization, system, or enclave.
Cyber Defense Analyst
Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats.
Course Modules
- Module 1 - Introduction
- Module 2 – Basics of Computer Security Logs
- Module 3 – Log Management Planning
- Module 4 – Log Management Infrastructure
- Module 5 – Log Management Operational Process
- Module 6 - Collection, Analysis, & Retention
- Module 7 - Logs as Digital Evidence
- Module 8 - Capstone
- Module 9 - Final Recommendations & Review
Image Gallery
No image gallery for this course as of yet.
Course Video
No video for this course as of yet.
Share this course
Need more information on this course?
Course Overview
Related Courses
Course Testimonials
“It has been a great experience learning RMF by the way of the instructor, Ashely Roan who was very knowledgeable in the field. Thank you for making the course enjoyable, relatable and memorable!”
Ashanta Gamble
“Instruction was first rate. Lunarline worked with my organization in a flexible manner allowing me to obtain the training as required. I enjoyed the instructor- knowledgeable, personable, professional, entertaining and impressive.”
Kevin Shaffer
“Excellent learning experience. Many classes taken over my career, this class offered a “real” world approach to a new methodology. Easy to follow, repetitious in the right areas. Excellent coverage of material at appropriate pace. Real world example were good!”
Deedie Weaver
“The class was excellent! I will continue to take classes from Lunarline in the future. The course material being loaded on a tablet was also a great idea because this will be a great resource to have in my future meetings.”
Nakia Jackson