Are you looking for course descriptions or other information from a previous academic year? Archived Catalogs are available in website format through 2014-2015 as well as in PDF format dating back to 1960-1961.
Tools and techniques for the investigation of suspect software by running it and watching its effect. Establishing a safe work environment, monitoring system behavior, network monitoring, file system monitoring, event reconstruction.
Prerequisites & Notes: CISS 247 Credits: 4 Grade Mode: Letter