The course discusses the policies and practices to system integration and architecture to ensure secure system operation and operation and information assurance. Explanation on how hardware and software installation contributes vulnerability in the organization.