This course investigates the various security protection and recovery techniques available for networks and personal computers including security policies, procedures, and requirements necessary for protecting the integrity of information stored on networks, workstations, and other computer systems.