This course exposes students to a broad range of forensic methods and
techniques used to detect, trace, and stop network intrusions and perform
network forensic investigations after an intrusion has occurred. Students will
learn how to identify network intrusion paths and points of entry and how to
“bag-and-tag” digital evidence, examine evidence, and document a chain of
custody throughout a forensic investigation. Prerequisite: CST* 246.