This course aims to monitor and document networks, lock down networks, thwart malware, prevent hacks by improving visibility into the environment, and use the power of data and security. In addition, the course covers topics such as how to monitor computer networks, acquire and prepare security data, correlate security events, use simple statistical methods to detect malware and predict rogue behavior. Furthermore, this course consists of laboratory experiments that provide hands-on experience in this topic.