Hardening the Infrastructure

Course ID


Course Description

Hardening the Infrastructure is designed to provide Network Administrators with an awareness of security-related issues and the essential skills they need to implement security in a given network. It is the first course offered in the first level of the Security Certified Program.


To ensure your success, we recommend you first take the following course or have equivalent knowledge:


This course is design for Network Administrators who are responsible for maintaining a wide range of network technologies, and who need to develop expertise in securing their networks.

Course Content

    Advanced TCP/IP
  • TCP/IP Concepts
  • Analyzing the Three-Way Handshake
  • Capturing and Identifying IP Datagrams
  • Capturing and Identifying ICMP Messages
  • Capturing and Identifying TCP Headers
  • Capturing and Identifying UDP Headers
  • Analyzing Packet Fragmentation
  • Analyzing an Entire Session
  • Fundamentals of IPv6

    Implementing IPSec
  • Internet Protocol Security
  • IPSec Policy Management
  • IPSec AH Implementation
  • IPSec ESP Implementation
  • Combining AH and ESP in IPSec

    Hardening Linux Computers
  • Introduction to Linux Administration
  • Fundamental Linux Security
  • Access Control
  • Securing Network Services
  • Final OS Hardening

    Hardening Windows Computers
  • Windows 2000 Infrastructure Security
  • Windows 2000 Authentication
  • Windows 2000 Security Configuration Tools
  • Windows 2000 Resource Security
  • Windows 2000 Auditing and Logging
  • Windows 2000 EFS
  • Windows 2000 Network Security

    Routers and Access Control Lists
  • Fundamental Cisco Security
  • Routing Principles
  • Removing Protocols and Services
  • Creating Access Control Lists
  • Implementing Access Control Lists
  • Logging Concepts

    Contingency Planning
  • Continuity and Recovery
  • Developing the Plan
  • The Technologies of Staying On
  • Backing up the Operating Systems

    Security on the Internet and the WWW
  • Describing the Components of the Internet
  • Identifying the Weak Points of the Internet
  • Describing Web-Hacking Techniques
  • Describing Methods Used to Attack Users

    Attack Techniques
  • Network Reconnaissance
  • Mapping the Network
  • Sweeping the Network
  • Scanning the Network
  • Viruses, Worms, and Trojan Horses
  • Malicious Web sites
  • Gaining Control over the System
  • Recording Keystrokes
  • Cracking Encrypted Passwords
  • Revealing Hidden Passwords
  • Social Engineering
  • Case Study: Social Engineering
  • Gaining Unauthorized Access
  • Hiding Evidence of an Attack
  • Performing a Denial of Service

For More Information

For training inquiries, call 850-308-1376

or email us at eramos@gbsi.com

Course Details

Duration - 5 days
Price - $2995.00 USD

(Discounts may apply. Call for more information.)

Course Actions

Acceletrain Collaborative Learning Environment (formerly know as VILT) places industry certified and expert instructors, peers, learners and multi-media components into a "borderless classroom", and interactive learning environment that can span multiple physical locations. VILT combines the benefits of the traditional brick-and-mortar classroom with innovative learning techniques and the cost savings of internet-based training.