Strategic Infrastructure Security

Displaying courses for United States [Change]


The Strategic Infrastructure Security course is designed to follow the hands-on skills utilized in the Tactical Perimeter Defense course and continues with hardening of strategic elements of your infrastructure, such as your Windows and Linux servers.


  • Detail the core issues of cryptography, including public and private key.
  • Harden SuSe Linux 10 Server computers.
  • Harden Windows Server 2003 computers.
  • Utilize ethical hacking attack techniques.
  • Secure DNS and web servers, and examine Internet and WWW security.
  • Perform a risk analysis.
  • Create a security policy.
  • Analyze packet signatures.



  • History of Cryptography
  • Math and Algorithms
  • Private Key Exchange
  • Public Key Exchange
  • Message Authentication

Hardening Linux Computers

  • Linux Filesystem and Navigation
  • Secure System Management
  • User and Filesystem Security Administration
  • Secure Network Management
  • Security Scripting
  • Using Linux Security Tools

Hardening Windows Server 2003

  • Windows Server 2003 Infrastructure Security
  • Windows Server 2003 Authentication
  • Windows Server 2003 Security Configuration Tools
  • Windows Server 2003 Resource Security
  • Windows Server 2003 Auditing and Logging
  • Windows Server 2003 EFS
  • Windows Server 2003 Network Security

Attack Techniques

  • Network Reconnaissance
  • Network Reconnaissance
  • Mapping the Network
  • Sweeping the Network
  • Scanning the Network
  • Vulnerability Scanning
  • Viruses, Worms, and Trojan Horses
  • Gaining Control Over the System
  • Recording Keystrokes
  • Cracking Encrypted Passwords
  • Revealing Hidden Passwords
  • Social Engineering
  • Gaining Unauthorized Access
  • Hiding Evidence of an Attack
  • Performing a Denial of Service

Security on the Internet and WWW

  • Describing the Major Components of the Internet
  • Securing DNS Services
  • Describing Web Hacking Techniques
  • Describing Methods Used to Attack Users

Performing a Risk Analysis

  • Concepts of Risk Analysis
  • Methods of Risk Analysis
  • The Process of Risk Analysis
  • Techniques to Minimize Risk
  • Continuous Risk Assessment

Creating a Security Policy

  • Concepts of Security Policies
  • Policy Design
  • Policy Contents
  • An Example Policy
  • Incident Handling and Escalation Procedures
  • Partner Policies

Analyzing Packet Signatures

  • Signature Analysis
  • Common Vulnerabilities and Exposures (CVE)
  • Common Packet Signatures
  • Normal Traffic Signatures
  • Abnormal Traffic Signatures

Training provider

Teaching mode:
Online - Self paced
Classroom - Instructor Led
Duration: 5 days
Gooroo has partnered with the global leaders in IT training to give you access to quality training, personalised to you, targeted at increasing your job opportunities and salary.

Our pricing

We do not display pricing as Gooroo members qualify for special discounts not available elsewhere. You must enquire through Gooroo to get this benefit.

New courses are happening all the time

Our partner's expert training consultant will provide you with the times and all the details you need. Enquire today.

Top skills covered in this course

Security testing
United States
This skill has an average salary of
and is mentioned in
of job ads in this area.
United States
This skill has an average salary of
and is mentioned in
of job ads in this area.
Microsoft Exchange Server
United States
This skill has an average salary of
and is mentioned in
of job ads in this area.
United States
This skill has an average salary of
and is mentioned in
of job ads in this area.