Break down the OSI model through a security lens. Understand which threats exist at each layer and how to implement appropriate security controls.