Computer Forensics and Network Intrusions

No Thumbnail Available

Keywords

computer forensics , network intrusions , forensic methods , network forensic investigation , IT , information technology , NRC , Northeast Resiliency Consortium

Project

Northeast Resiliency Consortium

Authors

Date Submitted

2015

Material Type

Syllabus

Secondary Material Type

Institution

Capital Community College

Industry Partner

N/A

License

CC BY

Funding Source

TAACCCT Round 3

Additional Public Access

Abstract

This is the course outline for Capital Community College’s Computer Forensics and Network Intrusions. This course will expose students to a broad range of forensic methods and techniques used to detect, trace, and stop network intrusions and perform network forensic investigations after an intrusion has occurred. Students will learn how to identify network intrusion paths and points of entry, “bag-and-tag” digital evidence, examine evidence, and document a chain of custody throughout a forensic investigation.

Industry (NAISC)

Information Technology -- Computer Operating Systems (Programming), Digital Forensics, Cyber Security, Network Security, IT Security (51)

Occupation (SOC)

Computer and Mathematical Occupations -- Network and Computer Systems Administrators (15-1071)

Instructional Program (CIP)

Architecture and Related Services (04)

Credit Type

Credential Type

Associate Degree

Educational Level

1st year Community College or equivalent
2nd Year Community College or equivalent

Skill Level

Quality Assurance Organization