eduglopedia.org
 307

Summary

This course focuses on the detection, isolation and response to security breaches and attacks. It provides a detailed examination of the entire computer forensic process and presents specific procedures required to respond to a computer crime incident. Subjects include recognizing unauthorized access, identifying file anomalies, and traffic monitoring.

Notes: Offered as an online course.

Number of credit hours per week 3
Presence of students On-campus and on-line

Prerequisites

Prerequisite: Business Majors: Sophomore GPA Requirement and a grade of “C” or better in ISA 3200 and ISA 3210; Non-business Majors: A grade of “C” or better in ISA 3200 and ISA 3210 and permission of the Coles College of Business.

Comments

Editors

 
Feedback