Computer Information System - Course Description

Evidence of malicious code is used to identify potentially compromised information systems or information system components. The information system provides near real-time alerts when the following indications of compromise or potential compromise occur: protected information system files or directories have been modified without notification ... ................
................