We will practice procedures used to determine if a system is compromised, mitigate the threat, and determine the root cause. We will use common digital forensic tools.