The unit will cover topics on the broader area of trustworthy computing systems. The first part of the unit will include an introduction to trustworthiness in the design-time flux, asymmetry analysis of cyberspace and its effects to trustworthy system design, trade-off for cybersecurity performance vs. functionality. The second part of the unit comprises trustworthy system strategies for risk management, information assurance fundamentals, cybersensors, exploitation tactics and holistic intelligence including cybersecurity command and control design (including command and control centres). The third part of the unit will comprise topics on architecting trustworthy cybersecurity, formal verification and protocol assurance for trustworthy systems, optimisation for cybersecurity (knapsack algorithm) and sensitivity analysis (including basics of probability).