Hardening Network Infrastructure

It appears you don t have a PDF plugin for this browser. No biggie... you can click here to download the PDF file.

HDN Course Introduction

This Course is how to protect your infrastructure and protect your network by using network security technology such as Firewall, Proxy IDS/IPS and harden Operating system and services and Network device such as Routers/Switches and also how to manage your network with network monitoring tools to detect threats

HDN Course Objectives

  • To understand Information Security Hardening Concept
  • To understand Network Infrastructure Security Design
  • To understand and Implement Operating System Security
  • To understand and Implement Network Devices Security
  • To understand and Implement Security Monitoring Concept
  • To understand and Implement Security Devices in Network Infrastructure

HDN Course Prerequisite

  • Knowledge of network fundamentals including OSI model, TCP/IP Protocol, and basic Cisco hardware familiarity.
  • Existing Internetworking knowledge.
  • Knowledge about Basic Operating system (Windows, Linux)

HDN Course Highlights

  • Software and tools provided
  • Free membership for ACIS Alumni
    • Access to the latest information related to the course subjects
    • A life-time class re-sit

Target Group

  • Network and Systems Administrators
  • Network and Systems Engineers
  • Information Security Professional

Course Outline of HDN

Module 1: Network Threats

  • Understand Network Attack
    • Denial-of-service (DoS) Attacks
    • Distributed denial-of-service (DDoS) Attacks
    • Back door Attacks
    • Spoofing Attacks
    • Man-in-the-Middle Attacks
    • Replay Attacks
    • Password Guessing Attacks
  • TCP/IP Attacks
    • TCP SYN or TCP ACK Flood Attack
    • TCP Sequence Number Attack
    • TCP/IP Hijacking
    • ICMP Attacks
    • Smurf Attacks
    • ICMP Tunneling
  • Demo :Network Threats
Module 2: OS Hardening
  • Role Supported by Server Core
  • OU Design for Security Policies
  • GPO Design for Security Policies
  • Implementing a Security Baseline
  • Local Security Policy
    • Account Policy Best Practice
    • Developing Good Auditing Policy
    • User Rights Assignment
    • Security Options
  • Deploy Domain Level Security Policy using GPO
  • LAB: Audit Microsoft with Penetration Testing tools
  • LAB: Deploy Security Policy using GPO and Microsoft Security toolkit
  • LAB: Hardening Windows server 2003 & XP & 2008 & 7
  • LAB: Audit Active Directory
Module 3: Hardening your Network with Firewall
  • Firewall Placement Design
  • Firewall Categorized
  • Firewall Architectures
  • Configuring and Managing Firewalls
  • LAB: IPTables Linux Firewall
  • LAB: Audit Firewall with Penetration Testing tools
Module 4: Hardening your Network with Intrusion Detection and Prevention
  • Intrusion Detection Systems
  • Type of IDS and IPS
  • IDS Detection Methods
  • IDS Response Methods
  • Deployment and Implementation of and IDS and IPS
  • LAB: Snort Installation
Module 5: Implement VPN and Dial-in Remote Access
  • VPN Concept
  • Type of VPN
  • VPN Implementation in Network Infrastructure
  • Implementing 2 Factor Authentication
Module 6: Hardening Routers and Switches
  • Introduction Switch and Router threats
  • Hardening Management Access
  • Hardening Service and Features
  • Hardening Router and Switch
  • LAB: Hardening Cisco Router and Switch
  • LAB: Audit Switch and Router with Penetration Testing tools
Module 7: Secure Network with Content Filters
  • Content Filtering Architectures
  • LAB :Implement Content Filtering Firewall
Module 8: Hardening Wireless LAN Connection
  • Introduction Wireless LAN Threats
  • Introduction Wireless Security
  • Hardening Wireless LAN Technology
  • LAB: Audit Wireless LAN Technology with Aircrack-ng Suite
Module 9: Implement AAA
  • Explain the functions and importance of AAA
  • Describe the features of TACACS+ and RADIUS AAA protocols
  • Configure AAA authentication
  • Configure AAA authorization
  • Configure AAA accounting
Module 10: Hardening your Network with Network management
  • Management Information Base (MIB)
  • SNMP Security
  • SNMPv1 ,SNMPv2 and SNMPv3 Interoperability
  • Structure of Management Information
  • LAB : Install SNMP Agents
  • Performance Base Monitoring
    • Cacti
    • Orion ( Solarwinds ) Network Performance Monitoring
    • MRTG ,PRTG
  • Availability Base Monitoring
    • Nagios
    • Zenoss
  • Network flow Monitoring
    • netFLOW
    • ntop
  • LAB : Implement Cacti
  • LAB : Management Cacti
  • DEMO : SNMP Management tool Solarwinds
Module 11: Implementing a Secure Perimeter
  • DMZ Implementation and Design
  • Internet Access Module
  • WAN Access Module
  • Extranet Access Module
  • Wireless Access Module
  • E-commerce Access Module
    • Web Application Threats
    • Web Application Security

Course Level



5 Days

Tuition Fee

32,000.00 THB

Our website uses both essential and non-essential cookies to analyze use of our products and services. This agreement applies to non-essential cookies only. By accepting, you are agreeing to third parties receiving information about your usage and activities. If you choose to decline this agreement, we will continue to use essential cookies for the operation of the website. View Policy