Competitive business environment, asset evaluation & identification, information systems & networking, intelligence and counterintelligence, info collection & analysis methods, counterintelligence by deception and denial of service, conflict in cyberspace, information systems protective security, insider system attacks, external system attacks, intrusion detection, incident reporting and situational awareness, reaction to attack, damage control and business continuity, national infrastructure issues, practical use of hacking and intrusion detection software tools. -- Course Website
Prerequisites: 309858 (v.1)<br/> Technological Infrastructure 502<br/> <br/> or any previous version