Design of the single most secure network

Apply the various concepts you have learned throughout this course to the design of the single most secure network possible, capable of supporting three IT services: e-mail, file transfer (centralized), and VPN.After you have fully designed your network, you will need...