At the end of this course, learners will be able to implement various aspects of system and network defense. They will also be skilled in configuring local and server-based access control. Furthermore, learners will be equipped to recommend cloud security requirements based on a given cloud scenario, and they will be proficient in using different types of logs and records to store information regarding hosts and the network.