Skip navigation

Visualization and reporting

Visualization and reporting: SSCP Cert Prep: 3 Risk Identification, Monitoring, and Analysis
Visualization and reporting: SSCP Cert Prep: 3 Risk Identification, Monitoring, and Analysis

Security monitoring efforts generate a large amount of information that may be useful to analysts investigating a security incident, or simply monitoring enterprise cybersecurity. In this video, Mike Chapple explains how machine and application logs, packet dumps, and the output of security devices all play an important role in security event data analysis.

Resume Transcript Auto-Scroll
Skill Level Intermediate
1h 28m
Duration
3,200
Views
Show More Show Less
Skills covered in this course
Security IT

Continue Assessment

You started this assessment previously and didn't complete it. You can pick up where you left off, or start over.

Start Your Free Trial Now

Start your free trial now, and begin learning software, business and creative skills—anytime, anywhere—with video instruction from recognized industry experts.

Start Your Free Trial Now