Introduction to the basic investigation techniques used when a security breach has occurred or a system has been compromised. These techniques enable the IT security specialist to participate in the evidence collection phase of an investigation, which may include criminal investigation. Study includes techniques that enable restoration of a compromised system without interfering with the investigative process and evidence. Discussion includes common practices for reporting breaches and updating policies and procedures to prevent similar breaches. 3 Credits (3 Lecture) Prerequisite(s): CIT246 and CIT335 and IAS311.