I would like to suggest that when you are designing, configuring, and setting up your system that you give some thought to the general security principles of protection. This will help you focus where you spend your time, money, and resources. Sadly a lot of the mass market security companies sell products instead of security.
The overall objective should be to get the unauthorized people or activity to go away before you have to deal with it.
The five "D"s is a very good model. You can google it for much more detail, but in a nutshell:
Deter - this makes the "bad guy" think about going somewhere else. It usually contains signs, fences, thorny hedges, lighting, etc. Detect - this is to let the system, and you/others, know about a problem. It usually contains movement triggered video, alarm switches, driveway detectors, etc. Remember that detection serves no purpose if it does not trigger some form of action. For example, seeing that someone is in your driveway when you are at work an hour away is not very useful. It is only useful if it triggers some action that would have an effect on the activity. I have seen lots of people at work getting an alarm on their phone and then helplessly worrying about it until someone could act on it and find out it was a false alarm. Deny - this is to hopefully prevent the action from occurring. It usually contains locks, deadbolts, automatic doors, biometric or coded (manual or fob) entry, fences Delay - this is to slow the bad actor down until help arrives. It usually contains, locks, deadbolts, loud sirens, flashing lights, etc. In a residential setting I generally think of Deny and Delay together, with the exception of a safe-room (which is primarily for Delay). Defend - this is the area of last resort. It is a very personal issue and needs to consider availability of professional help (Police, Fire, EMT, etc.) as well as your environment.
However, having said all of that, don't overlook the actual risk of things happening. MANY people protect against the wrong risks. For example, compare your local crime statistics to the likelihood of fire, lightning damage, flood, hurricane, or other natural disaster.
This means that here in the Texas Gulf Coast I have put much more effort into having my ELK and ISY monitor weather issues than window breakage. A key focus was to provide remote access to my data and home after we have to "bug out". After hurricane Ike, the first knowledge I had that my home survived was an ssh link to my automation system. I could then check whether the power was back on, the doors and windows intact, the fridge cooling, etc.
Hopefully this will help you in your planning and how you set up your system.
Good luck and have fun!