Contact Hour Total:64 Identify elements of firewall design, types of security threats and responses to security attacks. Use Best Practices to design, implement, and monitor a network security paln. Examine security incident postmortem reporting and ongoing network security activities.