Tutorial Implementing a Secure Network Infrastructure