The course examines the relationship between threats, vulnerabilities, countermeasures, attacks, compromises and remediation throughout the entire system life cycle. This also explain the key factors involved in the authentication and how they are used to verify identity and grant access. Legal and ethical considerations related to the handling and management of enterprise information assets are also part of of the course.