This course covers several topics such as Computer Security Technology and Principals, software security and trusted systems, threats, attacks and assets, security functional requirements, computer security strategy (security policy, security implementation, assurance and evaluation), data integrity, data confidentiality, data authenticity and data availability.