Information security related topics such as symmetric key cryptography, public key cryptography were presented. Basic ideas of unified threat management system were presented. Security management architecture and firewall were discussed. While discussing firewall, topics such as OSI model, network traffic, packet filtering etc were presented. Given a network topology how to create and configure network, host and gateway objects was discussed. Monitoring of traffic and connections was presented. The topic of monitoring suspicious activity rules was discussed. Network address translation was presented. Configuring Network Address Translation (NAT) was discussed. Configuration of NAT, testing of the NAT address and observing static NAT traffic was discussed.