Provides the knowledge necessary to improve security by identifying and prioritizing potential threats and vulnerabilities of a computer network. Introduces policies, legal aspects and compliance. Content: Cyber Stalking, fraud, and abuse. Denial of service. Hacking techniques. Industrial Espionage in cyberspace. Encryption. Network scanning and vulnerability scanning. Cyber terrorism and information warfare. Prerequisite: None.