Imagine that you are a manager of network operations for a large corporation and have been asked by your leadership team to provide a presentation on your organizations network security posture for the corporate headquarters campus local area network. Your presentation will cover the network security of host computers, WIFI, switches, routers, firewalls, intrusion detection systems, and servers (file server, application server, database server, web server, and email server).