|
Jan 15, 2025
|
|
|
|
CIS 370 - Network Forensics and Investigations5 Credits Students must be admitted to the appropriate BAS program to take this course. It is assumed that they have completed CIS 155 or its equivalent. This course focuses on tracking down network intruders and the tactics, techniques, and procedures they use. When, what, where, and how they were able to gain access gives a network administrator clues to design flaws in the network architecture and shortcomings in policies or procedures. This is a hands-on class in which students use network common tools used in investigations.
Pre-requisite(s) CIS 155 min 2.0 Program Admission Required Yes Admitted Program BAS - CIS FeesCF
Quarters Typically Offered Winter Evening Spring Evening
Designed to Serve For students admitted to the BAS program in CyberSecurity and Forensics. Active Date 20230320T11:43:23
Grading Basis Decimal Grade Class Limit 24 Contact Hours: Lecture 44 Lab 22 Total Contact Hours 66 Degree Distributions: ProfTech Course Yes Restricted Elective Yes Course Outline
- Review of networks and infrastructure
- Internet Protocols
- Review of Internet suite
- Vulnerabilities of the protocols
- Network based evidence
- Network device logging architecture and analysis
- Network evidence acquisition and analysis
- Network forensics
- Intrusion detection
- Malware and indicators of compromise
- Reporting events to a security operations center
- Applicable law and regulations
- Collecting evidence
Student Learning Outcomes Describe network architecture, protocols, and infrastructure, and the role of network design principles in investigations
Explain tactics, techniques, and procedures of security incidents
Explain and demonstrate the use of network monitoring tools and where network based evidence can be found
Effectively perform event and flow analysis
Analyze intrusion detection system events to generate intelligence
Configure a collector/analysis stack and analyze events to mirror the responsibilities of a security analyst
Investigate, analyze, and report on security events through research and open-source intelligence
Add to Portfolio (opens a new window)
|
|