Shadow

isssidebanner

Home :: Future Students :: ::
CET-250 Computer Forensics II
This course is a study in computer forensic practices with emphasis placed on methods used for prevention, detection, and apprehension of perpetrators of cyber-criminal activity. Topics include the roles of Chief Security Officers in the securing of system breaches, vulnerabilities, network and server security issues, OS and application security risks. Upon completion students should be able to identify and collect evidence to prove unauthorized and inappropriate access on computer systems and networks.

Prerequisites

Corequisites