COMPUTER SECURITY AND NETWORK FORENSICS (3 SCU)
Learning Outcomes:
Upon successful completion of this course, students are expected to be able to: explain and apply the principles in the construction of a secure network; define the parameters to achieve a higher degree of secure system; identify the requirements to have a desired state of a system; develop a set of rules, algorithm, or program to meet the desired need of a computing system; and apply the techniques and tools to produce an innovative security computing solution.
Topics:
Forensics is a discipline that learns how to reconstruct past actions. This course offers methodologies in digital forensics that analyze computer environments and network data in order to investigate a possible intrusion. It details the steps from sampling an evidence material, reconstructing a crime scene chronologically, and analyzing the damage that the intruder might have caused.
Prerequisite: – Ethical Hacking and Penetration Testing
Published at :
SOCIAL MEDIA
Let’s relentlessly connected and get caught up each other.
Looking for tweets ...