Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
In this course, you will continue your advanced cybersecurity journey by analyzing logs for signs of attack. You'll also detect attacks using active monitoring systems and perform digital forensics to discover evidence of such attacks. These all contribute to the second stage of the overall CFR-A program: Analyze.
This is the second course in a multi-course Specialization.
All of the courses in this Specialization require that you use the provided virtual machines, which include all of the necessary tools and system configurations for the activity environment. The course setup instructions provided in the first course go into more detail about the hardware and software requirements.