Ability to apply network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).