In this course, things that must be considered and carried out in implementing information system security are discussed. A number of other relevant aspects were also discussed, such as information system risk management and information system control evaluation.