In this video, Mike examines the various log files that techs can use to troubleshoot networks. Botanists and woodworkers may be disappointed by this video's misleading title.
- I've done a lot of training…for law enforcement over the years…and one of my favorite stories…about law enforcement training…is I was teaching this class,…and this old, he looked like a Columbo kinda guy,…smoking cigarettes and wore a tie and a crumpled hat.…And the guy looks at me and he goes,…cause I'm trying to explain computers…and Window directories and stuff like that.…And he just looks at me and he's like,…"Kid, just tell me where the log files are."…So, and I can see it as a law enforcement person…they would wanna, you know,…'cause the log files keep tracK of things.…
And the hard part I had with this guy…was to explain to him is I don't know…where the log files are because they're everywhere.…It depends on the operating system,…it depends on the applications,…it depends on what you're trying to keep track of,…log files are all over the place.…Now we can break these log files down…into some fairly broad-spectrum groups.…For example, pretty much any individual computer,…or router, or switch, is going to have…
We are a CompTIA Content Publishing Partner. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.
- What is risk management?
- Managing change to a network
- Mitigating network threats
- Training users
- Denial of service and social engineering attacks
- Hardening devices
- Testing network security
- Network monitoring
- Security information and event management (SIEM) tools