Find a university to explore its courses and reviews.
Introduces computer forensics methods, techniques, and tools for auditing, security, privacy, and legal functions. Addresses chain of custody and legal issues.
No one has reviewed this course yet. Share your experience and help future students know what to expect.
Takes about 2 minutes. Every review is anonymous — no account needed.