This course will focus on concepts of information security. It will examine cybercrime through vulnerabilities in operating systems, networks & the human element. This course will also focus on vulnerabilities caused by physical designs & logical implementations of security models. All networks inherently have vulnerabilities based on the nature of IP traffic and Ethernet topology that can be manipulated by hackers. This course aims at assisting students in understanding these vulnerabilities and identifying areas that can be compromised. This is a necessary foundation for further investigations and remedial actions covered in the Access Controls, Hacking & Exploits and Network Monitoring & Penetration Testing courses in semester 2.