New Horizons Lexington KY Computer Training
New Horizons Computer Learning Center presents

Strategic Infrastructure Security On-Site Training

This on-site training class is also available as Public Schedule Seminar.

This course is designed to follow the hands-on skills utilized in the Tactical Perimeter Defense course and continues with hardening of strategic elements of your infrastructure

Course Description/Agenda

The Strategic Infrastructure Security course is designed to follow the hands-on skills utilized in the Tactical Perimeter Defense course and continues with hardening of strategic elements of your infrastructure, such as your Windows and Linux servers

At Course Completion:
- Detail the core issues of cryptography, including public and private key.

- Harden SuSe Linux 10 Server computers.

- Harden Windows Server 2003 computers.

- Utilize ethical hacking attack techniques.

- Secure DNS and web servers, and examine Internet and WWW security.

- Perform a risk analysis.

- Create a security policy.

- Analyze packet signatures.

Prerequisite(s) or equivalent knowledge:
Tactical Perimeter Defense
Lesson 1: Cryptography
History of Cryptography
Math and Algorithms
Private Key Exchange
Public Key Exchange
Message Authentication
Lesson 2: Hardening Linux Computers
Linux Filesystem and Navigation
Secure System Management
User and Filesystem Security Administration
Secure Network Management
Security Scripting
Using Linux Security Tools
Lesson 3: Hardening Windows Server 2003
Windows Server 2003 Infrastructure Security
Windows Server 2003 Authentication
Windows Server 2003 Security Configuration Tools
Windows Server 2003 Resource Security
Windows Server 2003 Auditing and Logging
Windows Server 2003 EFS
Windows Server 2003 Network Security
Lesson 4: Attack Techniques
Network Reconnaissance
Network Reconnaissance
Mapping the Network
Sweeping the Network
Scanning the Network
Vulnerability Scanning
Viruses, Worms, and Trojan Horses
Gaining Control Over the System
Recording Keystrokes
Cracking Encrypted Passwords
Revealing Hidden Passwords
Social Engineering
Gaining Unauthorized Access
Hiding Evidence of an Attack
Performing a Denial of Service
Lesson 5: Security on the Internet and WWW
Describing the Major Components of the Internet
Securing DNS Services
Describing Web Hacking Techniques
Describing Methods Used to Attack Users
Lesson 6: Performing a Risk Analysis
Concepts of Risk Analysis
Methods of Risk Analysis
The Process of Risk Analysis
Techniques to Minimize Risk
Continuous Risk Assessment
Lesson 7: Creating a Security Policy
Concepts of Security Policies
Policy Design
Policy Contents
An Example Policy
Incident Handling and Escalation Procedures
Partner Policies
Lesson 8: Analyzing Packet Signatures
Signature Analysis
Common Vulnerabilities and Exposures (CVE)
Common Packet Signatures
Normal Traffic Signatures
Abnormal Traffic Signatures


More Seminar Information

New Horizons Computer Learning Center
New Horizons Lexington KY Computer Training

Delivery Method

On-Site Training On-Site Training

Also Available As

Seminar Seminar

Add to favorites Add to favorites
Email Email this page

On-Site Training
Information Request Form

Please complete the form for more information and/or a quote for this on-site class.




City and State


Number of students:
(at least 10 for consideration)

When do you want to hold the

How long would you like for the

Additional comments to trainer:

We value your privacy!