This course begins with an overview of why most systems are not secure, and why monitoring and surveillance alone do not work and why security must be built into a system from its foundation. We will then discuss how to build systems that are resistant to active, evolving adversaries. Students will be exposed to the design, evaluation, certification, and accreditation of trusted systems. We will look at hardware and software considerations for building trusted systems, and configuration management and systems administration of trusted systems. We will also study special considerations when building trusted applications, such as databases and distributed systems.