Introduces CIA triad (confidentiality, integrity, availability), identification, authentication, authorization, auditing, and accountability. Covers security tools and breach methods for each component.