This course will focus on concepts of Information Security. It will examine cybercrime through vulnerabilities in operating systems, networks & the human element. This course will also focus on vulnerabilities caused by physical designs & logical implementations of security models. All networks inherently have vulnerabilities based on the nature of IP traffic and Ethernet topology that can be manipulated by hackers. This course aims at assisting students in understanding these vulnerabilities and identifying areas that can be compromised within operating systems, networks, cloud-based infrastructure, and Internet of Things (IoT). This is a necessary foundation for further investigations and remedial actions in security domains.