examine rules governing the protection of human when participating in research, and to look at and explain the cybersecurity culture
- Explain the cybersecurity culture
- Describe and explain the IRB process
- Identify technologies to log, monitor and audit networks and systems