Description
In-depth study of system forensics including methodologies used for analysis of computer security breathes. Collect document and evaluate evidence to perform postmortem analysis of a security breach.
Upon successful completion, a student will be able to identify computer investigation issues; identify legal issues associated with computer investigations; collect document evidence; and evaluate network traffic.
32 lecture hours and 32 lab hours
Prerequisite: ITSY2342