Systems currently generate a large amount of data, and it is necessary to create environments that allow information to be centralized to optimize analysis. In this course, aspects related to the centralization and management of security events will be worked on in order to proactively detect possible attacks.
In the event that the student does not have knowledge of computer security, it is recommended that before taking this course, he completes the introductory course to Computer Security.
Contents
Benefits for the participant
To whom it is addressed