Procedures for identification, preservation, and extraction
of electronic evidence. Auditing and investigation of network and host system
intrusions, analysis and documentation of information gathered, and preparation
of expert testimonial evidence. Forensic tools and resources for system administrators
and information system security officers. Ethics, law, policy, and standards
concerning digital evidence. (4 units)