Previous Lecture Complete and continue  

  1.8 Understanding the Security Attack Surface in Different Network Topologies