Student Learning Outcomes
Attacks on our systems are becoming increasingly broad and complex. It is simply not feasible to conduct full host-based forensic analysis on every system in an organization of any size. The proper use of network forensics can enable examiners to determine the origin and impact of malicious events quickly and effectively. This course will allow students to develop the understanding of the fundamentals of network forensics, normal and abnormal conditions for common network protocols, the process and tools used to examine device and system logs, wireless communication, and encrypted protocols.
STUDENT LEARNING OUTCOMES:
STUDENT LEARNING OUTCOMES:
- Evaluate the security risks of common network protocols.
- Analyze techniques to encrypt common network traffic.
- Deploy a network employing diverse transmission and collection technologies.
- Analyze diverse log formats, protocols and the security impact of the event generating processes.
- Apply the configuration and deployment strategies for position logging aggregators and collection devices throughout a network environment.
- Identify the risks associated with wireless technologies, protocols, and infrastructure.
Prerequisites
Please see eServices for section availability and current pre-req/test score requirements for this course.