SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThe 21st century is known as the information age. Where people, places, and devices all communicate in an endless stream of information passing by at the speed of light. With such an infinite amount of communication taking place around the world, it is important to be able to manage this information in an efficient and secure manner. Information Security has many facets and branches, but to really understand what is going on in this new world, you need the ability to read, translate, and understand the wide variety of logs generated by the information stream. This document will discuss the importance of logs in the 21st century, and give an idea of what problems Information Security professionals face when trying to analyze them. We start from the beginning by defining what a log really is and what its purpose is. Then we talk about ways to improve your understanding of logs, how to decipher their cryptic formats, and how to manage logs effectively. Finally we wrap up with discussion on legalities of logs, and why it is so critical to effectively manage, maintain, and secure logs.