Published: September 7, 2020
favorite0 forum0 poll60
By: Quang Nguyen, Cal State San Marcos
Develop a log analysis to support an investigation following security incident. This report record the process for analyzing suspect movement map using given DHCP and Firewall logs.
Excel files might not displayed correctly. Please download and view offline.