This course examines computer crimes, laws, and regulations. Also included are techniques for investigating a crime, gathering evidence, and handling procedures. Development and implementation of an incident-handling program is an important part of this course.