The Strategic Infrastructure Security course picks up right where Tactical Perimeter Defense leaves off. The second course in the SCP line-up leads to a certification of Security Certified Network Professional (SCNP). It will give a network administrator the additional hands on skills needed to protect their network from the inside out. This course teaches you about prevention techniques as well as giving the candidate an understanding of risk analysis and security policy creation in a blended technology environment. The up-to-date security lessons and intense, hands-on labs bring a real world network security to training candidates.
Lesson 1: Cryptography and Data Security
- Describe History of cryptography
- Math and Algorithms
- Private Key Exchange
- Public Key Exchange
- Message Authentication
Lesson 3: Hardening Windows Server 2003
- Windows 2003 Infrastructure Security
- Windows 2003 Authentication
- Widows 2003 Security Configuration Tools
- Windows 2003 Resource Security
- Windows 2003 Auditing and logging
- Windows 2003 EFS
- Windows 2003 Network Security
Lesson 5: Security in the Internet and the WWW
- Describing the Major Components of the Internet
- Securing DNS Services
- Describing Web Hacking Techniques
- Describing Methods Used to Attack Users
Lesson 7: Creating a Security Policy
- Concepts of Security Policies
- Policy Design
- Policy Contents
- An Example Policy
- Incident Handling and Escalation Procedures
- Partner Policies
Lesson 2: Hardening Linux Computers
- Linux File system and Navigation
- General Secure System Management
- User and File system Security Administration
- Network Interface Configuration
- Security Scripting
- Useful Linux Security Tools
Lesson 4: Attack Techniques
- Network Reconnaissance
- Mapping the Network
- Sweeping the Network
- Scanning the Network
- Vulnerability Scanning
- Viruses, Worms, and Trojan Horses
- Gaining Control over the System
- Recording Keystrokes
- Cracking Encrypted passwords
- Revealing Hidden Passwords
- Social Engineering
- Gaining Unauthorized Access
- Hiding Evidence of an Attack
- Performing a Denial of Service
Lesson 6: Performing a Risk Analysis
- Concepts of Risk Analysis
- Methods of Risk Analysis
- The Process of Risk Analysis
- Techniques to Minimize Risk
- Continuous Risk Assessment
Lesson 8: Analyzing Packet Signatures
- Signature Analysis
- Common Vulnerabilities and Exposures (CVE)
- Signatures
- Normal Traffic Signatures
- Abnormal Traffic Signatures
- Additional Instructor Notes