Completion requirements
Read this publication up to the end of Chapter 3.
Click on Intrusion Detection and Prevention Systems to open the resource.