1. Explain information systems security and its effect on people and businesses. 2. Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure. 3. Explain the role of access controls in an IT infrastructure. 4. Explain the role of IT operations, administration, and security policies. 5. Explain the importance of security audits, testing, and monitoring in an IT infrastructure. 6. Describe the principles of risk management, common response techniques, and issues related to recovery of IT systems. 7. Explain how businesses apply cryptography in maintaining information security. 8. Describe networking principles and security mechanisms. 9. Apply information security standards and U.S. compliance laws to real-world applications in both the private and public sector. 10. Describe information systems security educational opportunities and professional certifications