Illustrate secure network designs, creating diagrams by hand or with networking software.
Examples: load balancing, network segmentation, virtual private network, network based intrusion systems