Learn how to use system and network logs to reconstruct the timeline of a security incident and identify the root cause.