Courses
College Credit Courses
This course provides information on identifying inappropriate uses of corporate IT, gathering electronic evidence of wrong-doing, securing corporate systems from further misuse, and protecting electronic evidence from intentional or accidental modification. Hands-on exercises are an integral part of the course. Four contact hours: three lecture hours; one laboratory hour. A.S., A.A.S.