This lesson focuses on network perimeter defense. Students configure simple rules for a mock firewall to allow legitimate traffic while blocking suspicious requests based on IP addresses and ports.

Similar Lessons