This course aims to help students describe the basic network concepts such as port, protocol, OSI model, etc., the cybercriminal's intrusion strategies, and what kind of countermeasures can be taken to maintain the system security—also, response plans and processes against a security breach, ethical behaviors in the digital environment, and the risk assessment to be able to identify the assets that need to be protected the most.