The document discusses administering a secure network. It covers secure network protocols like TCP/IP, SNMP, DNS, and FTP. It describes how to properly place security devices in the network like firewalls, IDS sensors, and DDoS mitigators. It also explains how to analyze security data from logs, devices, software, and tools to identify incidents, violations, and security issues. Managing large volumes of data from multiple sources requires a centralized log analyzer.