The course discusses the policies and practices to systems integration and architecture to ensure secure systems operation and information assurance. Explanation on how software and hardware installation contribute vulnerability in the organization.