Skip main navigation
PLUSSA

v1.11.4

  • COMP.SEC.100 COMP.SEC.100 Kyberturvallisuus I / Cyber Security I
    • Begin by enrolling in a course.
  • Log in
  • Skip course navigation
  • Language

  • Change language

    Course

  • COMP.SEC.100
  • Course materials
  • Your points
  • Lyhytvideot

  • Mitä tarkoittaa riski? (opens in a new tab)
  • Inhimilliset tekijät (opens in a new tab)
  • Käyttäjän manipulointi (opens in a new tab)
  • Haittaohjelmat ja hyökkäystekniikat (opens in a new tab)
  • Diffie-Hellman-Merklen avaintenvaihto (opens in a new tab)
  • Verkon tietoturvatyökalut (opens in a new tab)
  • Site

  • Home
    • Begin by enrolling in a course.
  • Log in
  • Skip course navigation
  • Language

  • Change language

    Course

  • COMP.SEC.100
  • Course materials
  • Your points
  • Lyhytvideot

  • Mitä tarkoittaa riski? (opens in a new tab)
  • Inhimilliset tekijät (opens in a new tab)
  • Käyttäjän manipulointi (opens in a new tab)
  • Haittaohjelmat ja hyökkäystekniikat (opens in a new tab)
  • Diffie-Hellman-Merklen avaintenvaihto (opens in a new tab)
  • Verkon tietoturvatyökalut (opens in a new tab)
« 9.1 Fundamental concepts Course materials 9.3 Analyse: Analysis methods »
  1. COMP.SEC.100
  2. 9. Security Operations & Incident Management
  3. 9.2 Monitor: Data sources

Monitor: Data sources¶

Loading assignment...

Network traffic¶

Network aggregates: Neflow¶

Network infrastructure information¶

Naming¶

Routing¶

Application logs: Web server logs and files¶

Web server logs¶

Files and documents¶

System and kernel logs¶

Syslog¶

Posting submission...
« 9.1 Fundamental concepts Course materials 9.3 Analyse: Analysis methods »
  • Privacy Notice
  • Accessibility Statement
  • Support
  • Feedback (opens in a new tab)
  • PLUSSA v1.11.4

Loading...
Loading...

  • No matches