This chapter discusses securing networks through the use of intrusion detection and prevention systems, wireless security best practices, and virtual private networks (VPNs) for remote access. It covers topics such as IDS and IPS detection methods, securing wireless networks using encryption and authentication, common wireless attacks, and site-to-site and remote access VPN configurations. Network access control is also examined to inspect client devices and restrict unhealthy systems.