Prerequisite: IT 340 or equivalent. This course will explore the various means that an intruder has available to gain access to computer resources. Traditional security analysis often falls short due to the rapidly evolving threats that exist. The course was developed to teach how system and network vulnerabilities are found and exploited and what steps can be taken to mitigate the risk.