Objectives:
- Students will be able to analyze different types of log files collected from different network devices to determine abnormal activity that could indicate a possible network attack.
Standards:
- 3.5.A Describe the types of automated security tools used to detect cyber attacks.
- 3.5.C Analyze log files for indicators of network attacks.
Guiding Question:
How can log files can help identify threat actors or malicious activity?
Resources:
- Information Security Career Video: https://youtu.be/cVZktAEtWE4
- 3.5 Analyzing Network Logs PPT.pptx available on Google Classroom
- 3.5 Network Log #1, #2 and #3 available in class.
Assignment:
- Read through the 3.5 Analyzing Network Logs PPT.pptx presentation in today’s class.
- Divide into groups of 2. You will be provided with Network Log #1, #2 and #3. We will work with these log files in class today.
- Work as a team to answer the questions on the back of Network Log #2 and #3. We will work with Network Log #1 as a whole group, then your group will be given time to analyze and answer the questions on the back of Network Log #2, then we will move on to Network Log #3.
- Follow along with the in-class presentation and complete the analysis questions on Network Log #2 and Network Log #3 to complete the Lab. We will discuss your results in class.
Assigned: January 14th, 2026
Teacher Pacing Due Date: January 14th, 2026