ISSC621 Computer Forensics (3 semester hours)
This course examines information concealment techniques, technologies, hardware, software, and relevant legislation for cyber forensics to reveal and track legal and illegal activity. The course examines the process for investigation and introduces the tools and procedures required to legally seize and forensically evaluate a suspect machine. Also covered are the rules of evidence, chain of custody, standard operating procedures, and the manipulation of technology to conceal illegal activities, and revealing concealed information using cyber forensics.
View the course schedule to find out details about each course including prerequisites, course objectives, course materials, a snapshot of the syllabi, and session dates.