Technology of Network Security and Incident Response: An Introduction for Law and Policy Students
This course will introduce the technical aspects of computer network security and how organizations plan for and respond to cyberattacks. We will also discuss the basics of digital forensic technology. Though this course is intended to be a continuation of Technology of Cybersecurity, motivated students with even a rudimentary understanding of programming are welcome. The course is designed for graduate students in law, public affairs, and other non-technical disciplines. We will explore topics like denial of service attacks, intrusion detection, digital forensics, reverse engineering, mobile security, side-channel attacks, machine learning, VPNs, TOR, and The Dark Web.
Note that this course does not address legal or policy questions, as those are the subject of the separate Cybersecurity Foundations course taught by Professor Chesney. Both courses are part of the larger Strauss Center program promoting cross-disciplinary training related to cybersecurity across the graduate school community at UT.
|Monday, Wednesday||3:45 - 5:00 pm||TNH 3.142|
|Evaluation Method||Date||Time||Alpha Range||Room|
- Course Type
- Grading Method
- Pass/Fail Mandatory
Incident Response & Computer Forensics - Jason T. Luttgens, Matthew Pepe, and Kevin MandiaMcGraw-Hill Education , edition: Third
ISBN: 978-0071798686 (required)