Tutorial Implementing A Secure Network Infrastructure