This course provides the foundation for understanding the key issues associated with protecting information assets, determining the levels of protection and response to security incidents and designing a consistent, reasonable information security system, with appropriate intrusion detection and reporting features.