| Searching Current Courses For Fall 2016 |
|
Course: |
PSM 225
|
|
Title: | Forensic Computer Analysis V |
|
Long Title: | Forensic Computer Analysis: Computer Forensics V |
|
Course Description: | Provides students with an overview and concentration on securing a network from hackers and closing security holes. Networking overview, with a look at the popular network operating systems, along with tools that a hacker may use to enter a network, and how to track and prevent future break-ins. |
|
Min Credit: | 3 |
|
Max Credit: | |
|
Course Notes: | unique to CCD |
|
Origin Notes: | CCD |
STANDARD COMPETENCIES:
I. Discuss the history of hacking
II. Define and discuss the different network types that a computer forensic specialist will encounter in the field
III. Discuss the various internet based protocols utilized by hackers
IV. Discuss system exploitation techniques
V. Define and discuss the tools of the trade used by hackers and the people that track them down
VI. Discuss the common security holes in networks that lead to system exploitation by a hacker
VII. Discuss and define methods of tracking a hacker
VIII. Discuss methods for safeguarding your network
TOPICAL OUTLINE:
I. History of Hacking with an inside look at what makes a hacker tick along with where hacking began and what the current threats of today are
II. A look at various types of networks as they relate to the computer forensic field
III. Examination and utilization of the different type of internet protocols commonly used by hackers
IV. Application of the tools of the trade of a hacker
V. Apply the techniques of a hacker for the purpose of knowing what to look for in order to defend a network
VI. Tracking a hacker through hands-on investigations utilizing the skills and tools learned throughout the courses
Skip to top of page