1. Identify the threats posed to information and network security, as well as the common attacks associated with those threats
2. List and explain the major protocols used for secure communications
3. Discuss the various types of intrusion detection and prevention
4. Identify various Web threats and attacks
5. Explain how U.S. law enforcement and the U.S. legal system affect digital forensics