Examine rules governing the protection of human when participating in research, and to look at and explain the cybersecurity culture
explain the cybersecurity culture
Describe and explain the IRB process
Identify technologies to log, monitor and audit networks and systems