This course is a study of the art and science of Intrusion Detection, Intrusion Prevention, Incident Handling and Information Assurance. Topics include intrusion detections and their types; automated response to attacks, tracing intruders, and tools for intrusion detection; identifying attack patterns; deployment of resources and responses to handle the incident, surveillance, damage assessment, risk assessment, data forensics, data mining, attack tracing, system recovery, and continuity of operation. |