• Online, Self-Paced
Course Description

In this challenge, you will collect log data from a Linux computer. First, you will create a Log Analytics workspace, and then you will enable the Log Analytics virtual machine extension on an existing Linux virtual machine. Next, you will collect syslog and performance data from the virtual machine. Finally, you will view the collected data. Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start.

Learning Objectives

In this challenge, you will collect log data from a Linux computer. First, you will create a Log Analytics workspace, and then you will enable the Log Analytics virtual machine extension on an existing Linux virtual machine. Next, you will collect syslog and performance data from the virtual machine. Finally, you will view the collected data. Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start.

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.