Networks, computers, and other IT systems generate audit trial records or logs that document system activities. These logs also can tell what a hacker was doing in a particular system. Log analysis helps businesses understand user behavior comply with security polices, audits, and regulations.
Log Analysis Practices
Pattern detection and recognition
Tagging and classification
List of some log analysis tools
Here are some video links about Password Cracking:
Additional Links and practice CTFs: