Completion requirements
Read chapters 4, 5, and 6.
Click on Intrusion Detection and Prevention Systems to open the resource.