Log Files and Event Analysis

Blue and gold cyber
  • Course Code: CYBR8004
  • Course Level: 8
  • Course Field: All
  • Duration: 12 Weeks
  • Qualification: Micro-credential
  • Start Date: January 2022
  • Course Location: Online
  • Course Credit:
  • Course Contact: Dr. George O'Mahony
  • Fees: €625
ireland-dots-bg

Log Files & Event Analysis

Log files contain valuable information for infrastructure management as most malicious exploits and intrusions leave their fingerprints all over log files and system performance issues can be identified from analyzing specific log data. In this module, the learner will evaluate log files and learn tools to extract associated valuable data for detecting cyber threats and system performance issues. In particular, the module will provide the learner with skills to apply and use log file management tools, access log files, efficiently search log data using best practices. The learner will apply this knowledge to evaluate and implement YARA and Sigma rules for Indicators of Compromise (IoCs) and system information and event management tools. At the end of the module the learner should have developed a mindset for using log files for cyber security and incident investigation including system performance issues.

Lecturer: Dr. George D. O'Mahony

Log Files Internet

Important Information

  • Entry Requirements

    Applicants are required to hold at the time of enrolment a level 7with modules on Computer Networking. 

  • Learning Outcomes

    LO1 Evaluate log files, the associated data and accessing and search mechanisms. 

    LO2 Interpret valuable data from log files for cybersecurity and system performance purposes by applying best practices and tools. 

    LO3 Implement a log management system using security information and event management (SIEM) tools for use in infrastructure management. 

    LO4 Analyse log files from multiple devices and applications utilising log aggregation techniques and SIEM tools to identify indicators of compromise in ill-defined contexts. 

    LO5 Apply a log file analysis mindset for cyber security and system performance to the effective communication of incident reports. 

  • Prior Knowledge

    No prior knowledge needed

  • Time & Effort Required
    • 2 hours p/week lectures 
    • 2 hours p/week lab 
    • 3 hours p/week independent learning 
  • Timetable

    Wednesdays 6-8pm

Student Stories

“Cyber Skills provides the building blocks needed to set you up for a career in Cyber Security. Online learning and the ability to re-watch a lecture has given me the freedom to work a full-time job and also fit in my extra-curricular activities.”

Colm McSweeney, Secure Network Operations Pathway

“Security is paramount on financial systems, and it cannot be implemented as an afterthought, I wanted to reinforce my knowledge on Cyber Security, to continue to design robust systems capable of sustaining today’s sophisticated attacks.”

Sébastien Le Callonnec, Secure Systems Architecture Pathway