Deals with how to protect mission critical systems, how to deploy security management systems, IT security, ID Management, intrusion detection & prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, & more.