Explain the importance of monitoring the IT infrastructure, and the expected frequency to monitor depending on the nature of the vulnerability. Provide one example of an IT domain that needs to be monitored with the proposed frequency to monitor. Study two tools of your choice that can be used for cyber security monitoring, Explain what it is, why it should be used, and how to use it (not expected to implement but be able to explain). You can choose a tool found in the course learning resource, or a different tool