• Online, Self-Paced
Course Description

IT systems can be exploited from both external and internal sources. Discover how to monitor and analyze various types of systems for auditing and security purposes.

Learning Objectives

{"recognize the importance of continuous monitoring of various systems"}

Framework Connections