Examines the monitoring and logging concepts for the security of IT systems and networks. Learners examine security log management challenges, components, guidelines, and operations. Learners examine security audit policy and critical log review concepts.