Strategic Infrastructure Security (SC0-471)

Strategic Infrastructure Security


The Strategic Infrastructure Security (SIS) course is designed to follow the hands-on skills utilized in the Tactical Perimeter Defense (TPD) course. The SIS course continues with hardening of strategic elements of your infrastructure, such as your Windows and Linux servers, and goes into detail on one of the most critical areas to understand in security, Cryptography.

After this course, students will be able to:

  • Detail the core issues of cryptography, including public and private key.
  • Harden SuSe Linux 10 Server computers.
  • Harden Windows Server 2003 computers.
  • Utilize ethical hacking attack techniques.
  • Secure DNS and web servers, and examine Internet and WWW security.
  • Perform a risk analysis.
  • Create a security policy.
  • Analyze packet signatures.

Course Outline

Lesson 1: Cryptography and Data Security

  • Topic 1A: History of Cryptography
  • Topic 1B: Math and Algorithms
  • Topic 1C: Private Key Exchange
  • Topic 1D: Public Key Exchange
  • Topic 1E: Message Authentication

Lesson 2: Hardening Linux Computers

  • Topic 2A: Linux Filesystem and Navigation
  • Topic 2B: General Secure System Management
  • Topic 2C: User and Filesystem Security Administration
  • Topic 2D: Network Interface Configuration
  • Topic 2E: Security Scripting
  • Topic 2F: Useful Linux Security Tools

Lesson 3: Hardening Windows Server 2003

  • Topic 3A: Windows 2003 Infrastructure Security
  • Topic 3B: Windows 2003 Authentication
  • Topic 3C: Windows 2003 Security Configuration Tools
  • Topic 3D: Windows 2003 Resource Security
  • Topic 3E: Windows 2003 Auditing and Logging
  • Topic 3F: Windows 2003 EFS
  • Topic 3G: Windows 2003 Network Security

Lesson 4: Attack Techniques

  • Topic 4A: Network Reconnaissance
  • Topic 4B: Mapping the Network
  • Topic 4C: Sweeping the Network
  • Topic 4D: Scanning the Network
  • Topic 4E: Vulnerability Scanning
  • Topic 4F: Viruses, Worms, and Trojan Horses
  • Topic 4G: Gaining Control Over the System
  • Topic 4H: Recording Keystrokes
  • Topic 4I: Cracking Encrypted Passwords
  • Topic 4J: Revealing Hidden Passwords
  • Topic 4K: Social Engineering
  • Topic 4L: Gaining Unauthorized Access
  • Topic 4M: Hiding Evidence of an Attack
  • Topic 4N: Performing a Denial of Service

Lesson 5: Security on the Internet and the WWW

  • Topic 5A: Describing the Major Components of the Internet
  • Topic 5B: Securing DNS Services
  • Topic 5C: Describing Web Hacking Techniques
  • Topic 5D: Describing Methods Used to Attack Users

Lesson 6: Performing a Risk Analysis

  • Topic 6A: Concepts of Risk Analysis
  • Topic 6B: Methods of Risk Analysis
  • Topic 6C: The Process of Risk Analysis
  • Topic 6D: Techniques to Minimize Risk
  • Topic 6E: Continuous Risk Assessment

Lesson 7: Creating a Security Policy

  • Topic 7A: Concepts of Security Policies
  • Topic 7B: Policy Design
  • Topic 7C: Policy Contents
  • Topic 7D: An Example Policy
  • Topic 7E: Incident Handling and Escalation Procedures
  • Topic 7F: Partner Policies

Lesson 8: Analyzing Packet Signatures

  • Topic 8A: Signature Analysis
  • Topic 8B: Common Vulnerabilities and Exposures (CVE)
  • Topic 8C: Signatures
  • Topic 8D: Normal Traffic Signatures
  • Topic 8E: Abnormal Traffic Signatures