Previous Lecture Complete and continue  

  1.6 NetFlow for Network Security