By the end of this module, you should be able to:
Explain how routers are used as network protection systems
Describe firewall technology and tools for configuring firewalls and routers
Describe intrusion detection and prevention systems, web-filtering technology and other technologies
Explain the purpose of honeypots
Discuss different technologies used
Discuss heuristic vs. anomaly vs. behavior and ML