Building Network Security Capabilities: Implementation Guide Based on Proof of Concept