Tools and techniques for the investigation of suspect software by running it and watching its effect. Establishing a safe work environment, monitoring system behavior, network monitoring, file system monitoring, event reconstruction.
Prerequisites & Notes: CISS 247 Credits: 4 Grade Mode: Letter