This course covers the concepts of computer system security models, networking security, and the layered protocol architectures, detection and prevention of intrusion and attack, digital evidence collection and evaluation, and the legal issues involved in computer forensic analysis. (Spring odd years)