Logging Courses Online

System - Logging

Live Instructor Led Online Training Logging courses is delivered using an interactive remote desktop! .

During the course each participant will be able to perform Logging exercises on their remote desktop provided by Qwikcourse.


How do I start learning Logging?


Select among the courses listed in the category that really interests you.

If you are interested in learning the course under this category, click the "Book" button and purchase the course. Select your preferred schedule at least 5 days ahead. You will receive an email confirmation and we will communicate with trainer of your selected course.

Logging Training


Basics of Adminlog

About

Adminlog provides the command line tool "i" which permits administrators to read, write, and share first person notes about their administrative actions on a server.


7 hours

$1,990

Discover Autocheck

About

Autocheck is a distributed, extensively configurable, systems monitoring tool for unix'es written in Perl. It includes SMS and email notification and a lot of checks.


7 hours

$1,990

Discover BSDSAR

About

BSDSAR is a System Activity Reporter for FreeBSD. It is very useful if you have a server that is used for NFS, web, ftp, samba, etc, serving and you need to know how heavily loaded the box is.


7 hours

$1,990

Basics of BackupRotator

About

BackupRotator is a small Java utility to rotate files of any kind (including backup files, log files, etc.) and to be able to keep the newest *n* files.


7 hours

$1,990

Explore Battery Life Tool Kit

About

Battery Life Tool Kit is a set of scripts and programs to monitor and log power consumption of Linux laptops/notebooks under different workloads. Set of reference workloads is included in the Tool Kit


7 hours

$1,990

Explore DeepDigest

About

A file integrity checker. Similar to hashdeep but in a GUI.

DeepDigest is a file integrity checker. It calculates hash values for selected files and allows the files to be verified against those values. Its GUI interface provides several features not found in similar programs. Roughly speaking, DeepDigest is a GUI version of md5deep/sha1deep/sha256deep. To use DeepDigest, a user first creates a "job". This specifies the directory to be hashed and the hash algorithm to be used (MD5, SHA-1 or SHA-256). The results of a job run are saved to an archive file. Subsequent runs of the job are compared to this archive to determine which files have changed. New, deleted, renamed or moved files are also reported. The results view may be sorted, filtered and searched. Results may be exported in csv format or to another installation of DeepDigest. DeepDigest may be run from the command line and from scripts. The name of the job to be run is passed as a command line argument. DeepDigest is written in C++ and uses the Qt libraries.


7 hours

$1,990

Discover EventCentral

About

EventCentral collects each night in a central repository Microsoft Windows' event logs from the network neighbourhood. They can be checked the next morning via a web page.


7 hours

$1,990

Explore Fail2SQL

About

Fail2SQL is an addon to Fail2Ban which logs information to a MySQL database. This information can then be used in reports, graphs or by third party programs to take further action such as permanent blocking, reporting to ISP etc.


7 hours

$1,990

Work around with Free Windows Network User Accounting

About

User Computer and IP Address Tracking

FWNUA (Free Windows Network User Accounting) runs silently in a Windows login script or GPO and collects data about user logins. FWNUA keeps track of the workstations logins so you don't have to! FWNUA now supports syslog and Splunk! Look for the fwnua - syslog version in the files list. Use Splunk or your own syslog server with data mining tools to create a robust user tracking system. Find our Spunk app on Splukbase


7 hours

$1,990

Explore Frontier Data System

About

Frontier Data System is a collection programs for data acquisition and data mining. It uses MySQL and PHP to monitor process variables and performance of shop floor equipment. Produces information on issues such as cycle time, downtime and SPC.


7 hours

$1,990

Basics of GLBOX

About

We are looking for a general solution that monitors execution of any program, regardless of the programing language it has been written in, or the accessibility to source code.


7 hours

$1,990

Learn HTTP Log Sniffer

About

This product sniffs web traffic on a Linux/Unix machine and creates log files for each website in CLF, Accrue, or a Verbose format. It can be configured with any IP address/Port Number combination, or it can be configured with domain names or virtual h


7 hours

$1,990

Work around with Free Log File Viewer Log4Net Log4J NLog

About

GamutLogViewer© is log file, logfile, viewer that works with Log4J, Log4Net, NLog, and user defined formats including ColdFusion. It supports filtering, searching, highlighting and many other useful features. This is a Windows application.


7 hours

$1,990

Know Enchanted Keyfinder

About

Is a Magical Jelly Bean Keyfinder fork. It is a utility that retrieves the product key used to install Windows from your registry or from an unbootable Windows installation. It works on Windows 9X, ME, NT/2K/XP, and Vista/Win7 and for other software.


7 hours

$1,990

Discover ssdeep

About

Recursive computing and matching of Context Triggered Piecewise Hashing (aka Fuzzy Hashing). Supports Windows, *nix, BSD, OS X, etc.


7 hours

$1,990

Learn Logwatch

About

Logwatch is a customizable log analysis system. Logwatch parses through your system's logs and creates a report analyzing areas that you specify. Logwatch is easy to use and will work right out of the package on most systems.


7 hours

$1,990

Discover ddrescueview

About

Graphical viewer for GNU ddrescue mapfiles

This small tool allows the user to graphically examine ddrescue's mapfiles in a user friendly GUI application. The Main window displays a block grid with each block's color representing the block types it contains. Many people know this type of view from defragmentation programs. The program is written in Object Pascal using the Lazarus IDE. It can be compiled to run on Windows, GNU/Linux and probably OS X, too. The downloads include binaries for the respective target platform and the project files (source code). Update 2020/09/01: ddrescueview version 0.4 alpha 4 has been released. Please consider testing this version. 


7 hours

$1,990

Work around with Tail for Windows

About

Windows visual tail for log and text files

WinTail is a freeware Tail for Windows tool, capable of simulating the LINUX / UNIX tail command, including extra features offered by the Windows GUI concept. Includes features such as SMTP and sound notifications of specific keywords found within the files being monitored by a sort of grep functionalty. This tool is compatible with all 32bit/64bit Windows platforms both client and server.


7 hours

$1,990

Work around with Cyberoam iView Open Source SIEM

About

Cyberoam iView; the Intelligent Logging & Reporting solution provides organizations network visibility across multiple devices to achieve higher levels of security, data confidentiality while meeting the requirements of regulatory compliance. To know more about Cyberoam and it’s security solutions.


7 hours

$1,990

Work around with NDW Network Data Wiping Hard Disks HDD

About

Wipe erase data from hdds on the network, unlimited hard disks

Automated network based hard disk drives / storage devices erasure is server based software which installs on a central server. Server is connected to network switches and several PXE boot enabled workstations are attached to the network. As soon as the workstation is powered on, it boots off the network via the server and begins wiping all the attached hard disk drives. Once all the hard drives are wiped, data related to each hard disk is stored in the central server’s database. Read WIKI Automated unattended network based data erasure wiping Comprehensive Reporting Web GUI reporting Generates certificate of data erasure Barcodes Labels Graphs Pie / Bar / Line Charts Hard Disks bad sectors & health reporting Hard Disk SMART Data collection Database Driven Distributed System Hard Disk Drives health reports Part Open Source * Friendly GUI Graphical User Interface Mass Hard Disk Drive Destruction Data Wiping HDD Data Eraser Storage Array Data Wipe


7 hours

$1,990

Fundamentals of ImSafe Host Based IDS

About

Immune Security Architecture For your Enterprise -- Host-Based Intrusion detection for UNIX based systems, at the process level. Detect changes in the normal behavior of processes, advanced features to detect Buffer Overflows.


7 hours

$1,990

Explore JENNOM

About

JENNOM - Java Enterprise Network Nodes Monitor

JENNOM - Java Enterprise Network Nodes Monitor, project free, portable, cross-platform and 100%-pure java. ICMP and DNS used to check the nodes. In addition, Jennom calculate loss packets and all sending packets - see 'Loss/All' column. Support filtering by different fields and export data to PDF/XLS/XML/CSV files. Use standart OS ICMP packet-size - Linux=64 bytes, Windows=32 bytes. When any node change state, Jennom write message to DB, send message to remote syslog-server and can send email for you. Only state changes will be fixed ! Support both IPv4 and IPv6.Support monitoring by IP-address and DNS-name.For DNS-name also checked DNS-service. Successfully tested in Windows and Linux for more 200 nodes. There are 2 application versions identical on a functionality - developed by JavaEE stack technologies and developed by Spring stack technologies + JSF/PrimeFaces + Apache Shiro security framework. Need JRE 1.8.


7 hours

$1,990

Fundamentals of James Bond Log

About

James Bond Log is a daemon log watcher similar to swatch or logcheck , it's completly written in C using PCRE Library and it provides the ability to be chrooted. It's actually at developing stage.


7 hours

$1,990

Basics of Key Logger MAX

About

Usefull keylogger to keep track of your kids ect.

This keylogger will provide you with access to keystokes, as well as screenshots of your user. This product emails the keystrokes in a readable format with logging data.


7 hours

$1,990

Work around with LUARM

About

A detailed user action logging engine

The Logging of User Actions in Relational Mode (LUARM) is a logging/audit engine designed to record in detail user actions in a Relational Database Management System (RDBMS). You can then have an organized 'who is doing what' view in your system, being able to easily correlate program execution, file access and network endpoint activity to user entities.


7 hours

$1,990

Work around with Linux Log Analyse

About

The program I create here is a purely console based program in the language C. The program makes it easier to searching after periodic events to a log file.


7 hours

$1,990

Learn Log4Cocoa

About

Log4Cocoa is an Objective-C based port of the popular Java based logging package Log4J. Additionally, Log4Cocoa plans to provide pure C based bindings as well. Log4Cocoa is not affiliated with the Apache Jakarta project in any way.


7 hours

$1,990

Learn LogView4j Log4J Event Viewer

About

LogView4J is a Java Swing Log4J socket listener GUI that makes application debugging simple. It has an intuitive user interface and is designed from the ground up for use of use, speed and stability, with features specifically tailored for Java developer


7 hours

$1,990

Fundamentals of Lograptor

About

Command-Line search tool for syslog files

Lograptor is a search tool for system logs written in legacy BSD syslog format RFC 3164 and for IETF syslog protocol RFC 5424. The program can perform searches in syslog files like as the UNIX command "grep", but with the addition of some filters and parameters, useful to restrict the search field and retrieve the relevant informations from log files. You could specify parameters like hostname, application, date, time range, plus a set of filters on message data.


7 hours

$1,990

Fundamentals of LumberJack4Logs

About

LumberJack4Logs is a viewer for log and trace files with the ability to extend the recognized data formats by adding text parser plugins.


7 hours

$1,990

Work around with MRTGFE

About

MRTG Front End. An individually configurable dynamix indexmaker for mrtg that can also calculate total incoming/outgoing data for a specified time period, view target configurations and more.


7 hours

$1,990

Explore NagiosAppender

About

log4j support for native nagios (nsca) integration

This project encompasses a custom appender for log4j, intended for system administrators and/or developers interested in using the log4j architecture to push messages to Nagios, via the Nagios nsca server. Release 2.0.0 supports asynchronous message delivery, tunable timeouts, and a buffer for redelivery support.


7 hours

$1,990

Learn Simple Python Keylogger

About

A simple keylogger written in python. It is primarily designed for backup purposes, but can be used as a stealth keylogger, too. It does not raise any trust issues, since it is a set of [relatively] short python scripts that you can easily examine.


7 hours

$1,990

Explore Logsurfer

About

Logsurfer is a program for monitoring system logs in real-time, and reporting on the occurrence of events. It is capable of grouping information together to enhance loganalysis and create automatic reports.


7 hours

$1,990

Fundamentals of Fail2Ban

About

Fail2Ban monitors log files like /var/log/pwdfail or /var/log/apache/error_log and bans failure-prone addresses. It updates firewall rules to reject the IP address or executes user defined commands. Please see code and download from . SF Fail2ban portal might not be up-to-date


7 hours

$1,990

Explore LKL Linux KeyLogger

About

LKL is a userspace keylogger that runs under Linux on the x86 arch. LKL logs everything that passes through the hardware keyboard port (0x60). It translates keycodes to ASCII with a keymap file.


7 hours

$1,990

Discover lilith

About

Lilith is a logging and access event viewer for Logback, log4j & java.util.logging. It has features comparable to Chainsaw for log4j. This means that it can receive logging events from remote applications using Logback as their logging backend


7 hours

$1,990

Basics of Pantheios The C C Logging Sweetspot

About

A C++ diagnostic logging API that is simple to use, 100% type-safe, generic, infinitely-extensible, atomic, platform-independent, and extremely efficient. And, best of all, it upholds the spirit of C: you only pay for what you use.


7 hours

$1,990

Discover 360 FAAR Firewall Analysis Audit Repair

About

360-FAAR Analyze FW1 Cisco Netscreen Policy Offline Using Config/Logs

360-FAAR (Firewall Analysis Audit and Repair) is an offline, command line, firewall policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in Checkpoint dbedit, Cisco ASA or ScreenOS commands, and its one file! Read Policy and Logs for: Checkpoint FW1 (in odumper.csv / logexport format), Netscreen ScreenOS (in get config / syslog format), Cisco ASA (show run / syslog format), 360-FAAR compares firewall policies and uses CIDR and text filters to split rulebases / policies into target sections and identify connectivity for further analysis. 360-FAAR supports, policy to log association, object translation, rulebase reordering and simplification, rule moves and duplicate matching automatically. Allowing you to move rules to where you need them. Build new rulebases from scratch with a single 'any' rule and log files, with the 'res' and 'name' options. Switch into DROPS mode to analyse drop log entries.


7 hours

$1,990

Learn rootsh

About

Rootsh is a wrapper for shells which logs all echoed keystrokes and terminal output to a file and/or to syslog. It's main purpose is the auditing of users who need a shell with root privileges. They start rootsh through the sudo mechanism.


7 hours

$1,990

Learn PyKeylogger Portable Edition

About

This project is to develop an installer package for a python key logger I modified for stealth use It will be packaged with NSIS for distribution on portableapps.com and elsewhere. it will fit on a usb key and provide quick and easy key logging on the go


7 hours

$1,990

Discover Web based Firewall Log Analyzer

About

Firewall log analyzer

Flexible web-based firewall log analyzer, supporting netfilter and ipfilter, ipfw, ipchains, cisco routers and Windows XP system logs, and mysql or postgresql database logs using the iptables ULOG or NFLOG target of netfilter others mapped to the ulogd format with a view. Fully supports IPv6 for database logs, and netfilter and ipfilter system file logs. Also supports Maxmind's GeoIP version 2 location databases. For Linux, FreeBSD, OpenBSD, Solaris, OSX,etc.


7 hours

$1,990

Discover Partylog2

About

Partylog2 is a Graylog2 appliance based in Turnkey Linux 12

Partylog2 is a Graylog2 appliance ready to install or boot in LiveCD mode. Its based in TurnKey Linux (TurnKey Core 12) which is based in Debian 6.


7 hours

$1,990

Basics of Pingy

About

Internet line monitor for mobile internet/wireless users.

Internet line monitor for mobile internet/wireless users. This application provides a traybar Icon which instantly gives you an indication of the speed/quality of your current internet connection.


7 hours

$1,990

Fundamentals of Project Lasso

About

Project Lasso is Windows-based open source software designed to collect Windows event logs, including custom application logs, and provide central collection and transport of Windows log data via UDP/TCP syslog.


7 hours

$1,990

Explore Protomatter Software Project

About

This is my collection of Java classes. Major chunks include: robust logging system, JDBC connection pools, lightweight application server, general utility classes.... enjoy.


7 hours

$1,990

Know Qmmslog

About

This is a port to Qt/C++ of the Jakarta project's excellent log4j package. Qt users can now benefit from a logging package that can be configured at run-time, thus minimizing (and ideally, eliminating) recompilation.


7 hours

$1,990

Explore Shell Keylogger

About

Quick, simple, terminal inspired keylog tool for beginners

Very basic, easy to read, easy to use keylogger tool. Developed for education purposes, and runs on the terminal. Includes option to run in stealth mode


7 hours

$1,990

Know Simple Log File Monitor

About

Simple Log File Monitor is a set of scripts to help monitor logs

Simple Log File Monitor is a bash script that can be used to monitor log files or other text files and execute commands on the output of the logfile. The motivation for this script originally was to be able to get a subset of a log file emailed to an email address easily while still being portable. Built to use as little as possible, a system with bash, wc, grep, tail, and date should be able to use this script, though a command-line email client would be required to send emails out.


7 hours

$1,990

Know SysLog2ODBC

About

SysLog2ODBC for Windows is a SysLog server with ODBC logging facility that can be run as a Win32 service. It starts listening on a configurable UDP port and, for each syslog message it receives, it executes a customizable SQL statement.


7 hours

$1,990

Work around with Syslog Collector

About

Syslog Collector listen for syslog messages and parse them following some regular expressions. It then increment some counters which are exposed through SNMP Agent-X interface


7 hours

$1,990

Work around with Syslog Server Java

About

Multiplatform: Easy setup Syslog Server tool for recording network messages. It opens the UDP port 514 on your computer to act as Syslog Server and displays the messages immediately in your screen.


7 hours

$1,990

Know Hyperic Application amp System Monitoring

About

Hyperic is application monitoring and performance management for virtual, physical, and cloud infrastructures. Auto-discover resources of 75+ technologies, including vSphere, and collect availability, performance, utilization, and throughput metrics.


7 hours

$1,990

Discover My Simple LogBook

About

MSLB is a crossplatform Simple Logbook program / application to write work logs or even a diary. MSLB can also use a bunch of presets that you can add with a simple doubleclick :) Logs get saved in a simple folder system. And its all portable.


7 hours

$1,990

Discover JFF Network Management System NMS

About

A complete OpenSource Network Management System Is SNMP-Standard Oriented (tested on Cisco and Linux). It Integrates Syslog, Tacacs, RRDtool (Performance Graphs), Maps, Traps, TFTP, Autodiscovery, Sound Alerts, AAA, Modular and Extensible.


7 hours

$1,990

Explore Winpooch Watchdog

About

THIS PROJECT HAS BEEN ABANDONED SINCE 2007, NO SUPPORT WILL BE PROVIDED. Winpooch is a watchdog for Windows (2000, XP, 2003, but only 32-bits). It detects modifications in your system, so as to detect a trojan or a spyware installation. It also includes a real-time anti-virus. Set your own security level for anti-spyware, ant


7 hours

$1,990

Know Barnyard

About

Output spool reader for Snort! This program decouples output overhead from the Snort network intrusion detection system and allows Snort to run at full speed. It takes input and output plugins and can therefore be used to convert almost any spooled fil


7 hours

$1,990

Basics of sudosh

About

sudosh is a sudo shell, filter and can be used as a login shell. Sudosh records all keystrokes and output and can play back the session as just like a VCR.


7 hours

$1,990

Basics of xrootconsole

About

xrootconsole tails a file in a window on your X11 root window. It aims to be as simple and resource-light as possible, within reason: it should run smootlhy on a P133 laptop. The program is non-interactive; all configuration is done on the command line.


7 hours

$1,990

Know TCP UDP footprint analysis

About

TCP/UDP endpoint analysis and mapping utility.

Providing users the ability to with accuracy map all inbound and outbound TCP/UDP connections to a Process ID and process owner. The application will also map a port to various performance metrics like processor and memory utilization.


7 hours

$1,990

Know TimeGuard V1 2

About

Windows Moble 6.0/6.5 and Windows XP/Vista/7 Application for worktimeloggingand -analysing. Easily captures worktimes and breaktimes each day. Outputs a .csv file (Microsoft Excel conform) result file monthly. Fingerfriendly User-Interface on Mobile


7 hours

$1,990

Know Windows Tail

About

Windows Tail is a C# program which functions as the UNIX tail command. It allows you to open a file after which it will display all new content written to that file. Output can also be filtered using regular expressions.


7 hours

$1,990

Work around with apachelogrotate

About

A better way to rotate apache logs. It can rotate multiple times a day and it compresses logs AFTER httpd stops writing to them. Deletes old logs based on partition fullness.


7 hours

$1,990

Discover augrok

About

augrok is a Linux audit log analysis tool written in Perl that provides searches based on real and effective user/group ids along with login id, executable name, terminal, within a time range, regular expression matching, and so much more.


7 hours

$1,990

Work around with file duplicate log finder

About

logs file, ctime, atime, mtime, size, type (file or dir may be include link in the future), md5sum and date. After easy to query (sqlite3) and find duplicate arqs and generate a set of commands to remove|move the dups files.


7 hours

$1,990

Explore Grep GUI

About

Search words in text files, display matching lines in tabs. Options to save results, exclude words, display the line numbers. Tiny file for searching big text files. Please leave feedback to help improve the application. Documentation coming soon.


7 hours

$1,990

Discover Basic Facebook Login Source

About

Looking for a simple way to use FB login method without FB sdk?

Looking for a simple way to use FB login method without FB sdk? Then you are in luck, because this is the most simplest login method for Facebook that could be made. Requirements - Timer - Textbox 1 "Username" - TextBox 2 "Password" - Button1 "Login" It's simple as that, no need for any other addons! 


7 hours

$1,990

Learn Huge File Editor

About

HFE is open source project for editing huge text files on Windows platforms. No installation required, can be used as portable app.


7 hours

$1,990

Learn Weblooker

About

Weblooker monitors serveral services on multiple systems for their sta

Weblooker monitors serveral services on multiple systems for their status, up- and downtimes. A webgui and Android client to view the current status and logged downtimes is available as separately package.


7 hours

$1,990

Explore FakeBO

About

Log common Windows trojan attempts (and optionally emulate the trojan). *This project is not actively maintained, and the software is of little use today.*


7 hours

$1,990

Know logcheck

About

Logcheck is software package that is designed to automatically run and check system log files for security violations and unusual activity. Logcheck utilizes a program called logtail that remembers the last position it read from in a log file.


7 hours

$1,990

Basics of phpLicenseWatcherExtension

About

Extension of phpLicenseWatcher

This tool is an extension of the phpLicenseWatcher tool which allows you to analyse your license usage in more detail. The tools manages user in custom groups (departments) at a given date range. Additionally you can see your actual license usage and the usage of defined workstations.


7 hours

$1,990

Know phpWatch

About

phpWatch is a flexible service monitoring system. Features include multiple contact methods for when services malfunction, multiple query methods, statistics gathering, and a fully extendable architecture for developers.


7 hours

$1,990

Learn pyrotate

About

English: Pyrotate is Python program for log files rotation. It uses any external archiver such as Winrar, 7-zip or gzip for compress and may rotate files in GNU/Linux logrotate's style. Program works in any OS such as Windows, Linux, Unix, Mac OS, etc, where Python may work. Dependencies: - Python v2.6 or better v2.7 (v2.5 for pyrotate v0.8 or earlier) - an external archiver Russian: Программа для ротации и/или архивации логов (и любых других) файлов, которая использует любой внешний архиватор и может ротировать файлы в стиле Линуксовой программы logrotate в любой ОС, где работает интерпретатор языка Python. Требования: - Python не ниже v2.6, а лучше v2.7 (или v2.5 для pyrotate v0.8 или ранее) - любой внешний архиватор


7 hours

$1,990

Discover querylog

About

Querylog is a console tool for performing SQL queries on a (log) files. Lines from one or more text files or stdin are matched, using regular expressions to an in memory database on which SQL queries can be performed.


7 hours

$1,990

Learn yalimon

About

yalimon (Yet another linux monitoring tool) is a python script that runs as a cron job, gathers data from several commands, stores it in a database and then creates graphs out of it. A web interface is used to view the images and to manage the module


7 hours

$1,990

Know Modular Syslog

About

A replacement to traditional syslog daemons. Including cryptographic log protection, mysql, postgresql. Supported on Linux, BSD, Irix, Solaris and AIX.


7 hours

$1,990

Know Network Leak Finder

About

netleak is a collection of small perlscripts that detects connectivity between network segments. It is mostly useful to detect "leaks" in large organizations that have private network segments physically separated from the Internet.


7 hours

$1,990

Discover Syslog Sharp

About

A syslog server written in C# .NET 4.0 that is modular, which allows a developer to easily add parsers and storage modules. A GUI console is included to view messages in real-time being captured by the server. Two functional modules are included.


7 hours

$1,990

Explore ansifilter

About

ANSI sequence filter

Ansifilter handles text files containing ANSI terminal escape codes. The command sequences may be stripped or be interpreted to generate formatted output (HTML, RTF, TeX, LaTeX, BBCode and Pango Markup).


7 hours

$1,990

Discover Mysql Monitor Tool

About

Mysql Monitor Tool is a useful application to monitor multiple Mysql server instances. Its simple and effective user interface allows you to track the health of your servers, check parameters and visualize trends via real time charts.


7 hours

$1,990

Fundamentals of NetComp Scan

About

IT Admin tool used for remote computer and network information

NetComp Scan comes with 7 tools to make life easier ComputerInfo - Allows you to get basic information from remote computer including last logged on user, storage device info, time since last restart, and installed programs. IP info - Ping allows you to get your computer IP information including public IP and also allows you to ping like cmd. MAC Changer - Changes MAC with option to revert to default. Ping Sweep - Sweeps a specified network range and returns online devices. Port Scanner - Scans a specified port range on a networked device and returns open/ closed ports. Uptime Monitor - Add multiple hosts and monitor real time "online" status with easy to see color scheme. Wifi Scan - Scan for wifi AP's and list all devices found. AP's are discovered by BSSID so you can see every AP around you. This tool also allows you to create log files for multiple AP's to help monitor your networks. A complete description of what each tool does can be found in the help menu


7 hours

$1,990

Work around with Ascii Art for Java

About

Visual components ready for ASCII rendering

Instantly create ASCII reports, multi-column tables, graphs, ... These can be rendered on screen, files and most importantly log streams.


7 hours

$1,990

Basics of High Interaction Honeypot Analysis Tool

About

The High Interaction Honeypot Analysis Toolkit (HIHAT) allows to transform arbitrary PHP applications into a web-based Honeypot. A semi-automatic user interface supports the analysis process, scans for attacks etc.


7 hours

$1,990

Explore Metalog

About

Metalog is a modern replacement for syslogd and klogd. The logged messages can be dispatched according to their facility, urgency, program name and/or Perl-compatible regular expressions. Log files can be automatically and safely rotated.


7 hours

$1,990

Work around with Php Logging System

About

Php-Loging-System is a front-end for viewing syslog-ng messages and snort alerts logged to MySQL in real-time, with Apache, Bash, and Squid detailed searching and analysis.


7 hours

$1,990

Basics of SB EventLog Monitor

About

SB EventLog Monitor is monitoring and consolidating Windows EventLogs. Events are collected from server using VBS and WMI or by Windows agent. Events are parsed using PHP and YOUR rules and are stored in MySQL database. Email alerts are supported.


7 hours

$1,990


Is learning Logging hard?


In the field of Logging learning from a live instructor-led and hand-on training courses would make a big difference as compared with watching a video learning materials. Participants must maintain focus and interact with the trainer for questions and concerns. In Qwikcourse, trainers and participants uses DaDesktop , a cloud desktop environment designed for instructors and students who wish to carry out interactive, hands-on training from distant physical locations.


Is Logging a good field?


For now, there are tremendous work opportunities for various IT fields. Most of the courses in Logging is a great source of IT learning with hands-on training and experience which could be a great contribution to your portfolio.



Logging Online Courses, Logging Training, Logging Instructor-led, Logging Live Trainer, Logging Trainer, Logging Online Lesson, Logging Education