Description
Intrusion Detection and Computer Forensics
This course will cover techniques for detecting the unusual usage patterns that typically signal a break-in. The course will also consider differences in detection of local intruders versus intrusion over networks. Finally issues in the prosecution of those breaking in to computers, particularly evidentiary issues are explored.

Prerequisite or corequisite: COMP 271.

Outcomes: Students will learn to configure ID systems (eg, snort) and analyze their output; They will also understand both network-based and host-based monitoring techniques.
Details
Grading Basis
Graded
Units
3
Component
Lecture - Required
Offering
Course
COMP 447
Academic Group
College of Arts and Sciences
Academic Organization
Computer Science