The page uses Browser Access Keys to help with keyboard navigation. Click to learn moreSkip to Navigation

Different browsers use different keystrokes to activate accesskey shortcuts. Please reference the following list to use access keys on your system.

Alt and the accesskey, for Internet Explorer on Windows
Shift and Alt and the accesskey, for Firefox on Windows
Shift and Esc and the accesskey, for Windows or Mac
Ctrl and the accesskey, for the following browsers on a Mac: Internet Explorer 5.2, Safari 1.2, Firefox, Mozilla, Netscape 6+.

We use the following access keys on our gateway

n Skip to Navigation
k Accesskeys description
h Help
George Mason University
    George Mason University
   
 
 
 
2016-2017 University Catalog 
  
2016-2017 University Catalog

TCOM 664 - Incident Response Forensics

Credits: 3
Not Repeatable for Credit
Offered by Electrical and Computer Engineering  


 

This course addresses incident detection, response, and those aspects of computer forensics pertinent to the investigation of trade secret theft, economic espionage, copyright infringement, piracy, and fraud. Procedures for gathering, preserving, and analyzing forensic evidence are discussed in detail and are applied to both computer and network incident response forensics.

Equivalent to CFRS 664

Prerequisite(s): TCOM 535
Schedule Type: LEC
Hours of Lecture or Seminar per week: 3
Hours of Lab or Studio per week: 0
When Offered: Spring