In-depth study of system forensics including methodologies used for analysis of computer security breaches. Gather and evaluate evidence to perform postmortem analysis of a security breach.
Learning Objectives
Students will be able to Identify computer investigation issues; identify legal issues associated with computer investigations; collect document evidence and evaluate evidence; and evaluate network traffic.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):