Read the course description below to learn how this course will be taught.
This course will be taught entirely online via Zoom.
This course will introduce the technical aspects of computer network security and how organizations plan for and respond to cyberattacks. We will also discuss the basics of digital forensic technology. Though this course is intended to be a continuation of Technology of Cybersecurity, motivated students with even a rudimentary understanding of programming are welcome. The course is designed for graduate students in law, public affairs, and other non-technical disciplines. We will explore topics like denial of service attacks, intrusion detection, digital forensics, reverse engineering, mobile security, side-channel attacks, machine learning, VPNs, TOR, and The Dark Web.
Note that this course does not address legal or policy questions, as those are the subject of the separate Cybersecurity Foundations course taught by Professor Chesney. Both courses are part of the larger Strauss Center program promoting cross-disciplinary training related to cybersecurity across the graduate school community at UT.
|Tuesday, Thursday||4:30 - 5:51 pm||ONLINE|
|Evaluation Method||Date||Time||Alpha Range||Room|
- Course Type
- Grading Method
- Pass/Fail Allowed
- Will use floating mean GPA if applicable
Incident Response & Computer Forensics, Third Edition - Pepe, Matthew, Luttgens, Jason, Kazanciyan, Ryan, Mandia, Kevin, Luttgens, Jason T.McGraw-Hill Education , edition: 3
ISBN: 978-0-07-179868-6 (required)
Computer Security Incident Handling Guide : NIST Special Publication 800-61, Revision 2 - Cichonski, Paul, Mllar, Tom, Grance, Tim, Scarfone, Karen, and U.S. Department of Commerce, U. S. DepartmentCreateSpace Independent Publishing Platform
ISBN: 978-1-4974-6803-0 (required)