Please enable JavaScript to use CodeHS

TX Foundations of Cyber: 127.792.d.14.f

CodeHS Lessons

analyze the purpose of event logs and identify suspicious activity

Standard
13.1 Digital Forensics
13.2 Forensic Case 1: Logs