Topics include the types of threats to computer hardware and software, public key infrastructure (PKI), certificate authorities, the protocols and standards involved in establishing PKIs, intrusion detection systems, and the laws which govern aspects of computer security.