Strategic Infrastructure Security

Course Specifications

Course number: 085801, rev 2.0
Course length:
Software: N/A N/A

Course Description

This course is the official courseware for the Security Certified Program SC0-471 certification exam. The Strategic Infrastructure Security (SIS) course is designed to follow the hands-on skills utilized in the Tactical Perimeter Defense (TPD) course. The SIS course continues with hardening of strategic elements of your infrastructure, such as your Windows and Linux servers, and goes into detail on one of the most critical areas to understand in security, Cryptography.

Prerequisites:  To ensure your success, we recommend that you have completed the SCP Tactical Perimeter Defense (TPD) course. The TPD course will ensure you have the core security concepts and skills in developing a secure perimeter for your organization.

Delivery Method:  Instructor-led, group-paced, classroom-delivery learning model with structured hands-on activities.

Hardware/Software Requirements

You will need:


Performance-Based Objectives


Course Content

Lesson 1: Cryptography and Data Security
Topic 1A: History of Cryptography
Topic 1B: Math and Algorithms
Topic 1C: Private Key Exchange
Topic 1D: Public Key Exchange
Topic 1E: Message Authentication

Lesson 2: Hardening Linux Computers
Topic 2A: Linux Filesystem and Navigation
Topic 2B: General Secure System Management
Topic 2C: User and Filesystem Security Administration
Topic 2D: Network Interface Configuration
Topic 2E: Security Scripting
Topic 2F: Useful Linux Security Tools

Lesson 3: Hardening Windows Server 2003
Topic 3A: Windows 2003 Infrastructure Security
Topic 3B: Windows 2003 Authentication
Topic 3C: Windows 2003 Security Configuration Tools
Topic 3D: Windows 2003 Resource Security
Topic 3E: Windows 2003 Auditing and Logging
Topic 3F: Windows 2003 EFS
Topic 3G: Windows 2003 Network Security

Lesson 4: Attack Techniques
Topic 4A: Network Reconnaissance
Topic 4B: Mapping the Network
Topic 4C: Sweeping the Network
Topic 4D: Scanning the Network
Topic 4E: Vulnerability Scanning
Topic 4F: Viruses, Worms, and Trojan Horses
Topic 4G: Gaining Control Over the System
Topic 4H: Recording Keystrokes
Topic 4I: Cracking Encrypted Passwords
Topic 4J: Revealing Hidden Passwords
Topic 4K: Social Engineering
Topic 4L: Gaining Unauthorized Access
Topic 4M: Hiding Evidence of an Attack
Topic 4N: Performing a Denial of Service

Lesson 5: Security on the Internet and the WWW
Topic 5A: Describing the Major Components of the Internet
Topic 5B: Securing DNS Services
Topic 5C: Describing Web Hacking Techniques
Topic 5D: Describing Methods Used to Attack Users

Lesson 6: Performing a Risk Analysis
Topic 6A: Concepts of Risk Analysis
Topic 6B: Methods of Risk Analysis
Topic 6C: The Process of Risk Analysis
Topic 6D: Techniques to Minimize Risk
Topic 6E: Continuous Risk Assessment

Lesson 7: Creating a Security Policy
Topic 7A: Concepts of Security Policies
Topic 7B: Policy Design
Topic 7C: Policy Contents
Topic 7D: An Example Policy
Topic 7E: Incident Handling and Escalation Procedures
Topic 7F: Partner Policies

Lesson 8: Analyzing Packet Signatures
Topic 8A: Signature Analysis
Topic 8B: Common Vulnerabilities and Exposures (CVE)
Topic 8C: Signatures
Topic 8D: Normal Traffic Signatures
Topic 8E: Abnormal Traffic Signatures