The document contains instructions for several assignments for a network security course. The first assignment asks students to summarize how they would hack into a nefarious business's network as an ethical hacker to find evidence in their database, while remaining anonymous. The second assignment involves designing a secure network diagram for a company with offices in Chicago and a remote site, incorporating defense in depth principles. The third assignment asks students to improve an existing network diagram by adding devices like servers, firewalls, and IDS systems.