This course covers the foundations and theoretical underpinnings for an understanding of the way in which computer systems can be attacked and penetrated by bypassing security or exploiting vulnerabilities in the system. It includes a number of principle(This course covers the foundations and theoretical underpinnings for an understanding of the way in which computer systems can be attacked and penetrated by bypassing security or exploiting vulnerabilities in the system. It includes a number of principle)