Courses
College Credit Courses
This course provides information on identifying inappropriate uses of corporate IT, gathering electronic evidence of wrongdoing, securing corporate systems from further misuse, and protecting electronic evidence from intentional or accidental modification. Hands-on exercises are an integral part of the course. Four contact hours: three lecture hours; one laboratory hour. A.S., A.A.S.