. "Students learn to analyze the business requirements for security that balances access, protection, and cost; and best practices in security including controlling access to resources, auditing access to resources, authentication, and encryption." . . . .