This course begins with an understanding of why risk management evaluations are useful. The general methodologies for security risk assessment and security test and evaluation, including the interviews are discussed and documentation research necessary, the student is provided practical lab exercises to provide a hands-on analysis of a fictitious site. Detection, recovery, and damage control methods in contingency/disaster recovery planning research, documentation and training; methods of and procedures for contingency planning and security policy formulation and enforcement. (3)