Course Outline: Introduction: Security principles, concept of computer security, security services and policies Security risks: Database security, operating systems security, secure coding Countermeasures: methodologies and tools for identifying and eliminating security vulnerabilities, techniques to prove the absence of vulnerabilities, and ways to avoid security holes in new software. Secure software design: essential guidelines for building secure software, information security standards.