Infrastructure Security

This course is included in our On-demand training solution.


To describe how to detect and respond to network intruders, understand operating system security, and describe LAN devices and topology

Target Audience

Network administrators, firewall administrators, system administrators, application developers, and IT security officers


Knowledge and skills equivalent of those tested for in the CompTIA A+ and Network+ certification exams

Expected Duration

435 min.

Course Objectives

Infrastructure Security

  • discuss the principles of detecting network intruders.
  • describe how to distract network intruders and limit the damage they can cause.
  • set up a decoy account and monitor both failed and successful login attempts.
  • describe the characteristics and features of intrusion detection systems.
  • describe the different types of intrusion detection mechanisms.
  • discuss the deployment of intrusion detection systems.
  • discuss how to respond to and manage computer-related security incidents.
  • recognize the functionality and deployment issues of intrusion detection.
  • describe network components and their application.
  • explain the role of bridges, switches, and routers in a network.
  • describe the basic operation of firewalls and proxy servers.
  • describe the various frauds that are carried out on PBX systems.
  • identify the different types of networking media that are used at the physical layer of the OSI model.
  • describe Windows NT and Windows 2000 security issues.
  • identify the threats to system security, both intentional and unintentional.
  • run a security scan on a networked workstation.
  • outline the main components of OS security.
  • explain changes that can be made to an OS to make it more secure.
  • discuss Windows 2000 Registry security.
  • perform tasks to improve the security of the Windows OS.
  • describe how VLANs operate.
  • list the components of NAT and explain when NAT should be implemented.