SCNP - Hardening the Infrastructure (HTI)

   

HOME

 

CONSULTING

Networking & Security
HIPAA Compliance 

COURSE DELIVERY

Public
Private
Cruise
Study Resources
 

GENERAL

Registration
Directions
San Francisco
Instructors
Contact
  

COURSES

 

CISCO 

CCNA

ICND

CCNP

BSCI
BCMSN
BCRAN
CIT
Program Info

CCSP

SECUR
CSPFA
CSVPN
CSIDS
CSI
Program Info
 

ASCENDANT

SCNP

HTI
NDC
Program Info

SCNA

ASI
ESS
Program Info

ISC2 

CISSP

 

EC-COUNCIL

CEH

Ethical Hacking

CHFI

Computer Forensics

 

HIPAA ACADEMY

CHA
CHP
CHSS
FAQs

 

Course Description

This course is designed to provide network administrators responsible for maintaining a wide range of network technologies with an awareness of security-related issues and the essential skills they need to implement security in a given network. 

This instructor-led 5-day  classroom delivery with structured  hands-on activities is the first course in Level One (SCNP) of the Security Certified Program.  After completion of this course, students wishing to complete Level One should take the Network Defense and Countermeasures course 

Students learn to work with various protocols, and create security across different platforms in router-based networks. Covers several of the techniques commonly used by network attackers and countermeasures to guard against them. 

Prepares the solution for the HTI exam (SC0-411)


Prerequisites

  • Experience with Windows 98, DOS, Windows NT/2000 (client and server), and Linux environments
  • The following CompTIA courses or equivalent experience:
    • A+ Core Hardware
    • A+ Operating Systems
    • Network+ 

Objectives

  • Identify the basics of network security
  • Define the TCP/IP layered architectures and work with advanced IP addressing protocols and commands
  • Describe and work with IP protocols and packets at various levels
  • Create router security using access control lists
  • Secure Windows NT and 2000 computers and test security effectiveness
  • Secure Linux computers and test security effectiveness
  • Define common Internet components and identify techniques used in web hacking
  • Examine and work with the common techniques used to attack networks and specific operating systems
  • IPSec implementation
  • Business Continuity Planning

Course Content
 

Chapter 1: Advanced TCP/IP  

  • TCP/IP Concepts  

  • Analyzing the TCP 3-way handshake

  • Capturing and Identifying

    • IP Datagrams

    • ICMP Messages

    • TCP Headers

    • UDP Headers

  • Analyzing Packet Fragmentation

  • Analyzing and Entire Session

  • Fundamentals of IPv6 
     

Chapter 2: Implementation of IPSec

  • Internet Protocol Security

  • IPSec Policy Management

  • IPSec AH Implementation

  • IPSec ESP Implementation

  • Combining AH and ESP in IPSec
     

Chapter 3: Hardening Linux Computers

  • Introduction to Linux Administration

  • Fundamentals of Linux Security

  • Access Control

  • Securing Network Services

  • Final OS Hardening 
     

Chapter 4: Hardening  Windows Computers

  • Windows 2000 Infrastructure Security

  • Windows 2000 Authentication  

  • Windows 2000 Configuration Tools

  • Windows 2000 Resource Security  

  • Windows 2000 Auditing and Logging

  • Windows 2000 Encrypting File System

  • Windows 2000 Network Security  
     

Chapter 5: Routing and Access Control Lists

  • Fundamental Cisco Security

  • Routing Principles

  • Removing Protocols and Services

  • Creating Access Control Lists

  • Implementing Access Control Lists

  • Logging Concepts 
     

Chapter 6: Contingency Planning

  • Continuity and Recovery

  • Developing the Plan

  • The Technologies of Staying On

  • Backing up the Operating System 
      

Chapter 7: Security on the Internet and the World Wide Web

  • Components of the Internet

  • The Weak Points of the Internet

  • The Techniques of Web Hacking

  • Methods of Attacking Users  
     

Chapter 8: Attack Techniques

  • Network Reconnaissance

  • Mapping the Network

  • Sweeping the Network

  • Scanning the Network

  • Viruses, Worms, and Trojan Horses

  • Malicious Web Sites

  • Recording Keystrokes

  • Cracking Encrypted Passwords

  • Reveal Hidden Passwords

  • Social Engineering

  • Case Study: Social Engineering

  • Gaining Unauthorized Access

  • Hiding Evidence of an Attack

  • Performing a Denial of Service