In this course, students learn the complexities, technical details, and skills involved in investigating instances in which network and computer defenses have been compromised due to intrusions. Because of the sheer scope of a network, this course will require students to expand their technical and analytical skills. They will examine the planning of intrusions, methods employed in the surveillance of networks, and techniques intruders employ to penetrate and damage them. These concepts will be put into the context of investigating crimes that occur where computer networks are the "victim."