Course Description
IT systems can be exploited from both external and internal sources. Discover how to monitor and analyze various types of systems for auditing and security purposes.
Learning Objectives
{"recognize the importance of continuous monitoring of various systems"}