CBROPS: Log Evidence Disk Images & Malware Analysis Output

placeholder

In this course you ll examine the importance of logs as well as types of evidence that can be acquired from them. Next you ll learn how critical disk images can be during an investigation and about the comparisons and analysis that can transpire in an investigation. Finally you ll review some of the most important information that can be found in the out of malware analysis tools. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.