Career and Technical Education (2022) Grade(s): 10-12 - Information Technology
CTE22.IT.C2.17
Identify and utilize appropriate data sources to support an investigation of a given security incident.
Identify and utilize appropriate data sources to support an investigation of a given security incident.
COS Examples
Examples: metadata, protocol analyzer output, syslog, rsyslog, syslog-ng