Hacking is breaking into computer networks and systems that are not your own. What is possible in hacking, and what techniques are available to prevent this? Wat is legal and what is criminal in this area? What about social media and privacy? How to build a security architecture? This second course from a package of three explores those issues, and lets you further develop your own Information Security Roadmap, for later use in your personal and professional life.