Hardening the Infrastructure

5 Day Course
Hands On
Code HTISCP

Book Now - 1 Delivery Method Available:

Scheduled Online Onsite

Overview

Hardening the Infrastructure is a five-day (forty hour) course. The training is a combination of teacher-led lecture, in-class discussions, and hands-on lab exercises. There are ten domains covered in the course, covering issues such as: Securing Windows, UNIX, and Linux operating Systems, Advanced TCP/IP, Security Fundamentals, Security Implementation, Router Security, and Attack Methods. Who Should Attend? All System Administrators and Managers who are responsible for the security of their systems, and those who want to achieve certification within the SCP pathways.

Training Partners

We work with the following best of breed training partners using our bulk buying power to bring you a wider range of dates, locations and prices.

Modules

Hide all

TCP/IP Concepts (16 topics)

  • The Models
  • RFCs
  • TheFunction ofIP
  • The Subnet Mask
  • Address Conversions
  • Routing
  • VLSM and CIDR
  • X-Casting
  • Layering and Subnetting
  • Analyze the 3-Way Handshake
  • Capture and Identify IP Datagrams
  • Capture and Identify ICMP Messages
  • Capture and Identify TCP Headers
  • Capture and Identify UDP Headers
  • Analyze Packet Fragmentation
  • Fundamentals of IPv6

Implementation of IPSEC (7 topics)

  • Internet Protocol Security
  • Internet Protocol Security Modes
  • IPSec Implementation
  • IPSec Policy Management
  • IPSec AH Implementation
  • IPSec ESP Implementation
  • Combining AH and ESP in IPSec

Hardening Linux Computers (5 topics)

  • Introduction to Linux Administration
  • Fundamental Linux Security
  • Access Control
  • Securing Network Services
  • Final O/S Hardening

Hardening Windows Computers (6 topics)

  • Windows 2000 Infrastructure Security
  • Windows 2000 Authentication
  • Windows 2000 Security Configuration Tools
  • Windows 2000 Resource Security
  • Windows 2000 Auditing and Logging
  • Windows 2000 Network Security

Routers and Access Control Lists (5 topics)

  • Fundamental Cisco Security
  • Routing Principles
  • Removing Protocols and Services Creating Access Control Lists
  • Implementing Access Control Lists
  • Logging Concepts

Contingency Planning (3 topics)

  • Continuity and Recovery
  • Developing the Plan
  • The Technologies of Staying On Backing up the Operating Systems

Security on the Internet and the WWW (3 topics)

  • Describe the Components of the Internet
  • Identify the Weak Points of the Internet Describe the Techniques of Web Hacking
  • Describe the Methods of Attacking Users

Attack Techniques (15 topics)

  • Network Reconnaissance
  • Mapping the Network
  • Sweeping the Network
  • Scanning the Network
  • Viruses,Worms,and Trojan Horses
  • Malicious web sites
  • Gaining Control over the System
  • Record Keystrokes
  • Crack Encrypted Passwords
  • Reveal Hidden Passwords
  • Social Engineering
  • Case Study: Social Engineering
  • Gain Unauthorized Access
  • Hide Evidence of an Attack
  • Perform a Denial of Service

Prerequisites

TCP/IP knowledge, Security + or MCSE qualification is recommended.

or call:408-759-5074

Alternatively you can request a callback or schedule a call with a Training Advisor

Course PDF

Print

Share this Course

+1
Share

Recommend this Course

Sections