This course studies cyber-attack prevention, planning, detection, response, and investigation with the goals of counteracting cybercrimes. The topics covered in this course include fundamentals of digital forensics, forensic duplication and analysis, network surveillance, intrusion detection and response, incident response, anti-forensics techniques, anonymity and pseudonymity, computer security policies and guidelines, and methods and standards for extraction and preservation of digital evidence.
Section Comments: Cross listed with COMP 755
Registration Approval Required. Contact Instructor or Academic Department for permission then register through Webcat.