In this course, students will learn the principles and techniques of network forensics investigation and the use of available forensics tools in the list of the International Association of Computer Investigative Specialists (IACIS) certification. This course explores security incidents and intrusions, including identifying and categorizing incidents, responding to incidents, using log analysis, analyzing network traffic, applying various tools, and creating an incident response team. Students will also learn about ethical implications of computer forensics reporting and the laws regarding computer evidence.