COURSE | TITLE | EFF YEAR | EFF TERM | DEPARTMENT | CREDIT HOURS | ||||
CS483 | DIGITAL FORENSICS | 2019 | 2 | Electrical Engineering and Computer Science | 3.0 (BS=0.0, ET=3.0, MA=0.0) | ||||
SCOPE | |||||||||
Digital Forensics will explore the evidence left behind when malicious activity occurs on an information system. The material in this course will build on your knowledge of Operating Systems, file formats, file system structure, computer architecture, and networking. The course begins with an overview of these areas, then examines how to find and extract digital evidence. During the course, you will be challenged with three projects (subjects to be chosen by you) and in class challenges that will allow you to demonstrate your understanding of the material. | |||||||||
|
|||||||||
SPECIAL REQUIREMENTS: | |||||||||
None |
TYPE | COURSE | EFF YEAR | EFF TERM | TRACK | RED BOOK FLG |
PRE REQUISITE | |||||
CS380 | 2017 | 1 | 1 | Y | |
CS481 | 2008 | 1 | 1 | Y |
AYT | #SECT/SIZE | CPBLTY | ENRLD | WAIT | SEATS | CLOSED | DETAILS | ||
2025 - 2 | 1 | 18 | 18 | 16 | 0 | 2 | N | Hours | |
2026 - 2 | 2 | 18 | 36 | 18 | 0 | 18 | N | Hours | |
2027 - 2 | 1 | 18 | 18 | 18 | 2 | 0 | N | Hours | |
2028 - 2 | 1 | 18 | 18 | 0 | 0 | 18 | N | Hours | |
COURSE | TITLE | EFF YEAR | EFF TERM | DEPARTMENT | CREDIT HOURS | ||||
CS483 | DIGITAL FORENSICS | 2017 | 2 | Electrical Engineering and Computer Science | 3.0 (BS=0.0, ET=3.0, MA=0.0) | ||||
SCOPE | |||||||||
Digital Forensics will explore the evidence left behind when malicious activity occurs on an information system. The material in this course will build on your knowledge of Operating Systems, file formats, file system structure, computer architecture, and networking. The course begins with an overview of these areas, then examines how to find and extract digital evidence. During the course, you will be challenged with three projects (subjects to be chosen by you) and in class challenges that will allow you to demonstrate your understanding of the material. | |||||||||
|
|||||||||
SPECIAL REQUIREMENTS: | |||||||||
None |
TYPE | COURSE | EFF YEAR | EFF TERM | TRACK | RED BOOK FLG |
PRE REQUISITE | |||||
CS380 | 2017 | 1 | 1 | Y | |
CS481 | 2008 | 1 | 1 | Y |
COURSE | TITLE | EFF YEAR | EFF TERM | DEPARTMENT | CREDIT HOURS | ||||
CS483 | DIGITAL FORENSICS | 2014 | 2 | Electrical Engineering and Computer Science | 3.0 (BS=0.0, ET=3.0, MA=0.0) | ||||
SCOPE | |||||||||
Digital Forensics will explore the evidence left behind when malicious activity occurs on an information system. The material in this course will build on your knowledge of Operating Systems, file formats, file system structure, computer architecture, and networking. The course begins with an overview of these areas, then examines how to find and extract digital evidence. During the course, you will be challenged with three projects (subjects to be chosen by you) and in class challenges that will allow you to demonstrate your understanding of the material. | |||||||||
|
|||||||||
SPECIAL REQUIREMENTS: | |||||||||
None |
TYPE | COURSE | EFF YEAR | EFF TERM | TRACK | RED BOOK FLG |
PRE REQUISITE | |||||
CS481 | 2008 | 1 | 1 | Y | |
EE375 | 2010 | 1 | 1 | Y |
COURSE | TITLE | EFF YEAR | EFF TERM | DEPARTMENT | CREDIT HOURS | ||||
CS483 | FILE PROC & DATABASE MGMT | 1990 | 2 | Electrical Engineering and Computer Science | 3.0 (BS=0.0, ET=0.0, MA=0.0) | ||||
SCOPE | |||||||||
|
|||||||||
SPECIAL REQUIREMENTS: | |||||||||
None |