This course focuses on the security aspects of systems that are composed of components and connections, and use software. It covers the concepts, principles, models, and techniques of access control, authentication, incident response and recovery, risk identification, monitoring and analysis, and systems and applications security. It provides students with advanced technical skills and knowledge to implement, monitor, and administer IT infrastructure using security best practices, policies, and procedures.