This course examines controls involving personnel, hardware, systems, and auditing and monitoring techniques, abuse channels and how to recognize them. Additional topics include threats, risks, and counter-measures to protect facilities, hardware, data, media, and personnel; facility selection, entry methods, and environmental safety procedures are also discussed.