Classes Using our Book

The following table is a list of classes that use our book as the primary or a recommended text. If you know of a class that’s using our book and is not on our list, please leave us a comment and we will add it

School Course Name URL
George Mason University AIT 673 Cyber Incident Handling/Response http://mason.gmu.edu/~jholcom9/ait673.html
George Mason University ISA 785 Research in Digital Forensics http://cs.gmu.edu/~astavrou/ISA785_S15.html
Eastern Michigan University IA 455 Incident Response http://catalog.emich.edu/preview_program.php?catoid=14&poid=6760&returnto=1938
New Mexico State University ET439 Advanced Digital Forensics and Incident Response http://nmsu.smartcatalogiq.com/en/2014-2015/Undergraduate-Catalog/Courses/Narrative-Courses/Spring-2015-Courses/E-T-439
New Mexico State University ICT339 Computer Forensics http://nmsu.smartcatalogiq.com/2014-2015/Undergraduate-Catalog/Courses/ICT-INFORMATION-AND-COMMUNICATION-TECHNOLOGY/300/ICT-339
University of Texas at San Antonio IS 3523 Intrusion Detection and  Incident Response http://catalog.utsa.edu/undergraduate/coursedescriptions/is/
Temple University MIS 5213 Intrusion Detection and Response http://bulletin.temple.edu/courses/mis/
Fordham University CISC 6920 Incident Response and Risk Management http://www.fordham.edu/info/24636/masters…
8 comments on “Classes Using our Book
  1. Matt Presser says:

    I’m using your book for my ET 439 Advanced Digital Forensics and Incident Response, and for our online ICT 339 Computer Forensics Course this coming Spring Semester. I’m even considering breaking it up and using it for both our intro ET 339 and the Advanced so we have more than 1 week to spend per chapter, I’m gonna see how it goes this coming semester first. Very excited about this book, its the closest thing I’ve found to how I’ve been teaching the course, now I don’t have to pull together so many other sources, I can work primarily with this book.

    matt

    • Jason says:

      Thanks for letting us know, Matt. It’s great to see more classes picking up our 3rd edition. I’ve updated the table above with ET 439 and ICT 339. Let us know if you begin to use the book for any other courses.

  2. Rene Thorup says:

    I am also planning to use part of the book for our undergraduate courses in Ethical Hacking and our MSc in Forensic Computing – That both now have Incident Response and Network Forensics as part of it. I was personally looking forward to the release of the book as I some year ago (as part of my job) took IR courses with MANDIANT. Great book!

    • Jason says:

      Thanks for the comment, Rene! If there is a web page for those courses that mentions the use of our book, please let us know and I will link to them from this page. Regards, Jason.

  3. Jason says:

    Today I noticed that another GMU class lists our book as the required text: ISA 785. I added the information in the table above.

  4. I have used the previous edition and am planning on using the 3rd edition this spring semester for the master program at Walsh College. Great book and love the updated version..much needed

  5. Matt says:

    I’m using it for my Incident Response and Computer Forensics class at Bucks County Community College located in, strangely enough, Bucks County, PA. It’s a continuing education course run by the colleges IT Academy, which provides technical classes for adult learners. The class is also prepping students to take the CERT-Certified Computer Security Incident Handler.

    I choose your book because the sequencing made sense – I teach an introduction to computer forensics, and incident response is just a natural progression to that class.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

*