Log Analysis
Bikash Jha
Cybersecurity Analyst | Security+ | Threat Analysis | Incident Response | proofpoint | Splunk Enterprise | CrowdStrike Falcon | SOAR | PowerShell | Python | Azure | AWS | Docker | Kubernetes | Ansible | Terraform | SOC
I recently completed the log analysis course on TryHackMe, where I explored various types of logs and common log file locations. I learned essential Linux commands for log analysis, including cat, less, tail, wc, cut, sort, uniq, sed, awk, and grep. Additionally, I gained valuable skills in using regular expressions to extract relevant information, filter data, and identify patterns.