Topics include the installation and management of systems and applications and hardware components including network devices, access control for system resources; the role of administrative policies and procedures, identification of threats and countermeasures; operational controls, and audit practices required for system security and system recovery.