Prerequisite: CIS 502

Examine the landscape, key terms and concepts of computer hackers and the criminals who break into networks, steal information and corrupt data. Topics include the various vulnerabilities of operating systems, software and networks, and the used by hackers to access unauthorized information and resources. Compare incident handling methods to use when information security is compromised.