The value of information in information systems and the dependence on their ongoing operation make them ideal targets for attackers and criminals. Cyber (Information) security is the all-encompassing processes and methods used to protect information systems. Students will learn what is required to ensure the security of information systems. How confidentiality, integrity and availability comprise the security triad. How Information systems are under threat and exploitation of vulnerabilities. How countermeasures are deployed to protect information systems. How authentication, authorization and non-repudiation impact information systems. How information system owners perform risk management by examining impact, likelihood and risk response to various threats.