Course description:
The course covers the principles and technologies utilized in and the processes followed in responding to cybersecurity incidents and crises. The course utilizes real-life case studies to develop how these technologies and processes are applied within the cybersecurity industry.
Academic honesty/integrity statement:
Students are expected to maintain the highest standards of academic integrity. All work submitted must be original and properly cited. Plagiarism, cheating, or any form of academic dishonesty will result in immediate consequences as outlined in the university's academic integrity policy.