Analysis and Correlation of Macintosh Logs

In this webcast, the presenter will cover the variety of logs, tools to read them and analysis of additional file system files to provide a clear picture of events. User, network, or software activities can provide a timeline that can be used to uncover the clandestine activity on the system-whether or not it was meant to be secret.

Provided by: SecurityTube.net Topic: Enterprise Software Date Added: Jul 2015 Format: Webcast

Find By Topic