Include a final network design.
Include a timeline for the project.
Explain the design approach and rationale.
Analyze the detailed design.
Prove that the design meets the data rate requirements.
Analyze the existing security situation in the organization.
Identify the predominant electronic and physical threats to communications networks.
Explain the importance of explicit enterprise security policies and procedures.
Describe potential threat detection and protection techniques.
Explain the importance of explicit enterprise security policies and procedures.
Describe how firewalls mitigate some network attack scenarios.
Describe common security concerns inherent to wired, wireless, and mobile networking.
Design a security hardware and software environment that will protect the organization