This guide will enable students to identify some of the security approaches to design a defensive strategy in a computer network environment. The overall focus is on the processes based on security policy emphasizing on hands-on skills in secure perimeter, connectivity, identify services and intrusion detection.