This lesson discusses the features and functions that are used to identify and protect against intrusion attempts and attacks.

Please login.