NCAE Mapping HubAuthoritative cross-reference for DCWF, NCAE Knowledge Units, O*NET, and the EWU Cyber Operations program
T447
Conduct analysis of log files, evidence, and other information in order to determine best methods for identifying the perpetrator(s) of a network intrusion.