This course focuses on the detection, isolation and response to security breaches and attacks. It provides a detailed examination of the entire computer forensic process and presents specific procedures required to respond to a computer crime incident. Subjects include recognizing unauthorized access, identifying file anomalies, and traffic monitoring.
Notes: Offered as an online course.
|Number of credit hours per week||3|
|Presence of students||On-campus and on-line|
Prerequisite: Business Majors: Sophomore GPA Requirement and a grade of “C” or better in ISA 3200 and ISA 3210; Non-business Majors: A grade of “C” or better in ISA 3200 and ISA 3210 and permission of the Coles College of Business.