• Identify and explain the layers that contribute to network security.
• What is meant by implementing network security through the strategy of defense in depth?
• How can an employee or security practitioner analyze and use log files to give meaning to events that occur on a network (consider mundane activities and unusual activities)?