NCAE Mapping Hub
T0447

Conduct analysis of log files, evidence, and other information to determine best methods for identifying the perpetrator(s) of a network intrusion.

Skill drills that exercise this task