All MS students are expected to have completed the undergraduate prerequisites:
Please note that MS IT students are expected to complete all prerequisites before taking any course in CS or the Quinlan School of Business. (This includes any additional prerequisites required by Quinlan.)
This course will cover techniques for detecting the unusual usage patterns that typically signal a break-in. The course will also consider differences in detection of local intruders versus intrusion over networks. Finally issues in the prosecution of those breaking in to computers, particularly evidentiary issues are explored.
Students will learn to configure ID systems (eg., snort) and analyze their output. They will also understand both network-based and host-based monitoring techniques.
|Fall 2013||Corby Schmitz||https://drive.google.com/file/d/0B5gClDnivRb5V1hQNW9FTVphV00/edit?usp=sharing|