(3:2:4) In-depth study of system forensics including methodologies used for analysis of computer security breaches. Gather and evaluate evidence to perform postmortem analysis of a security breach. Semester Hours: 3 Lecture Hours: 2 Lab Hours: 4
Add to Portfolio (opens a new window)