COMP 347: Intrusion Detection and Computer Forensics

This course covers techniques and algorithms for detecting unusual usage patterns that typically signal a break-in, including techniques for detecting evasive or stealthy attacks. Also covered are differences in detecting local versus network intruders. Additional topics: computer viruses, computer security management, computer forensics.

Credit Hours

 3

Description

This course will cover techniques for detecting the unusual usage patterns that typically signal a break-in.  The course will also consider differences in detection of local intruders versus intrusion over networks.  Finally  issues in the prosecution of those breaking in to computers, particularly evidentiary issues are explored.

Outcome

Students will learn to configure ID systems (e.g. SNORT) and analyze their output. They will also understand both network-based and host-based monitoring techniques.

Syllabi

Semester/Year Instructor URL
Fall 2013 Corby Schmitz https://drive.google.com/file/d/0B5gClDnivRb5V1hQNW9FTVphV00/edit?usp=sharing