This course is provided by Wintrac. Wintrac provides one stop shopping for all your IT
training needs. Wintrac’s course catalog of over two thousand courses includes courses on Security Training
Overview
Hardening the Infrastructure is designed to provide Network Administrators with an awareness of security-related issues and the essential skills they need to implement security in a given network. It is the first course offered in the first level of the Security Certified Program.
Prerequisites
To ensure your success, we recommend you first take the following course or have equivalent knowledge:
Delivery Method
Instructor-led, group-paced, classroom-delivery learning model with structured minds-on and hands-on activities.
Benefits
Students will learn to work with various protocols, and create security in router-based networks and across different platforms. They will also use some of the techniques that network attackers commonly use to learn the best ways to prevent attacks.
What's Next
After completing this course, students who want to complete Level 1: Defense of the Security Certified Program should take the next course in the series: Network Defense and Countermeasures.
Target Student:
We designed Hardening the Infrastructure for Network Administrators who are responsible for maintaining a wide range of network technologies, and who need to develop expertise in securing their networks.
Hardware/Software Requirements
To run this course, you will need:
- A class-prep set of disks that should consist of:
- Operating Systems:
- Bootable DOS diskette with common utilities.
- Windows 98
- Windows NT 4.0 Server
- Windows 2000 Server
- Red Hat Linux 8.0
- Drivers for all of the above
- Service Packs and upgrades:
- The following three can be burned onto one CD
- SP6a for NT4.0
- SP2 for Windows 2000
- SP2 for Windows 2000
- Others:
- Disk-Cloning/Imaging/Multicasting/SID-changing tools and utilities
- Students should have access to:
- Utilities (viewers/unzippers) and TOOLS (as indicated on the following
pages) for Level-1 with all the tools downloaded from the web.
- A Level1 CD included with the course manuals containing 'Captures' and
'Signatures' files for use with the course.
- An instructor's set that should consist of all of the disks in
the student set of disks plus:
- A Hardware Keylogger (for NSF/HTI)
- CheckPoint Firewall CD (for NDC)
- Classroom Requirements:
- 3 Cisco Routers (minimum 2500 Series, IOS v.12.2 or greater with IPSec/SSH
capability)
- 2 Instructor Machines:
- Instructor Machine 1 will be the Firewalled Gateway on NT 4.0 Server SP6a
(for the Checkpoint 2000 exercises).
- 2 10/100 Hubs
- Null modem and CAT5 crossover cables (1 set per 2 student machines)
- 12 Student Machines
- Student PC Setup:
- PIII 500 (700+ recommended)
- 128 MB Ram (256+ recommended)
- 8 GB HDD min. (if larger it doesn't matter)
- 2 NICs per PC (well-known brands preferred for promiscuous mode support)
- Video card (well known brands preferred from the point of view of driver
availability for all OSes)
- Tools:
- For use in class, you will also need to acquire the tools and utilities
described in the following tables. Tables are arranged by function, such as
network scanning, firewalls, and so forth. Links are provided to enable you
to download files from the Web. Create a Tools share (or a CD) for use in
class. Download and organize the tools in an appropriate folder structure,
such as in folders named Linux Tools, Windows Tools, and Miscellaneous.
The Miscellaneous folder can include utilities like MS Office file viewers,
file unzippers, Acrobat Reader, and so forth. The capture and signature files
required for some of the tasks in the course, as well as all the RFCs, are
included with each course manual.
SuperScan |
Windows/Eval is Free |
Yes |
http:// www.foundstone.com/ knowledge/scanning.html |
Nmap |
Linux/Free |
Yes |
http:// www.nmap.org/nmap/ nmap_download.html |
NmapFE |
Linux/Free |
Yes |
http:// www.nmap.org/nmap/ nmap_download.html |
NmapNT |
Windows/Free |
No |
http:// www.eeye.com/html/ Research/Tools/nmapnt.html |
Pinger |
Windows/Free |
No |
http://visualsoftru.com/ping/pinger.exe |
Strobe |
Linux, Windows/Free |
No |
http://www.luyer.net/software/strobe-classb/ |
Nessus |
Linux, Windows/Free |
Yes |
http://www.nessus.org |
udpflood.exe |
Windows/Free |
Yes |
http:// www.foundstone.com/ knowledge/ stress_testing.html |
NetScan Tools Pro |
Windows/Eval is Free |
No |
http://www.netscantools.com /nstdownload.html |
Netcat |
Linux, Windows/Free |
Yes |
- http://www.atstake.com/research/tools/nc110.tgz
- http://www.atstake.com/research/tools/nc11nt.zip
|
Visual Route |
Windows/Eval is free |
Yes |
http://www.visualroute.com/ |
NeoTrace |
Windows/Eval is free |
Yes |
http://www.tucows.com/preview/194046.html |
Network Monitor |
Windows/Built-in |
Yes |
Included in Windows NT 4.0 Server and Windows 2000 |
Ethereal |
Windows, Linux/Free |
Yes |
http://www.ethereal.com/distribution/Win32 |
Tcpdump |
Linux/Free |
No |
http://www.tcpdump.org/ |
Windump |
Windows/Free |
No |
http://windump.polito.it/install/default.htm |
WinPcap |
Windows/Free |
Yes |
http://windump.polito.it/install/default.htm |
L0pht Crack 2.5 |
Windows/Eval is Free |
Yes |
http://www.32bit.bhs.com /downloads/file.asp?id=4519 |
L0pht Crack LC3 |
Windows/Eval is Free |
Yes |
http://online.securityfocus.com /tools/1005 |
Crack 5.0 |
Linux/Free |
No |
ftp://ftp.openbsd.org/ pub/OpenBSD/2.7/ packages/i386/crack-5.0.tgz |
John the Ripper |
Windows, Linux, DOS/Free |
Yes |
http://www.openwall.com/john |
Snadboy's Revelation |
Windows/Free |
Yes |
http://www.snadboy.com |
Netbus |
Windows/Free |
Yes |
http:// nttoolbox.com/public/ tools/NetBus170.zip |
NetBus Pro |
Windows/Free |
Yes |
http:// home.t-online.de/home/ husky_college/nbpro201.exe |
SubSeven |
Windows/Free |
No |
http://www.subseven.ws/ |
NTFSDOS |
DOS/Eval is free |
Yes |
http://www.sysinternals.com/ (The Read-only version will do.) |
GetAdmin |
Windows NT/Free |
No |
http://packetstormsecurity.org |
Keylogger |
Any (This is hardware.)/$89 to $199 (one per class only) |
Yes |
http://www.keyghost.com |
Security keyboard |
Any (This is hardware.)/$129 to $299 (one per class only) |
Yes |
http://www.keyghost.com |
Keystroke logger |
Any (This is hardware.)/$54.95 (one per class only) |
Yes |
http:// www.electronickits.com/ spy/finish/ computer/key.htm |
Klogger |
Windows/Free |
Yes |
http://ntsecurity.nu/toolbox/klogger/ |
Internet Scanner 6 |
Windows/Free |
No |
Included with the Windows 2000 Server Resource Kit, or you can visit:
http://www.iss.net/download/
|
System Scanner 4.2 |
Windows/Free |
No |
Included with the Windows 2000 Server Resource Kit, or you can visit:
http://www.iss.net/download/
|
Snort |
Linux, Windows/Free |
No |
http://www.snort.org/ |
IDScenter |
Windows/Free |
No |
http:// www.packx.net/packx/ download/idscenter/ idscenter11rc1.zip |
CheckPoint 2000/NG Firewall-1 |
Windows NT 4.0 Server with SP6a/$2100 approx. (one per class only) |
No |
http:// www.comark.com/site /L4.cfm?item_number =CPFW%2DFIG%2D25%2DV41
(recommended). After purchase, create a user account with and obtain a license
for 172.17.10.1 (Instructor Machine-1) at http://usercenter.checkpoint.com
|
ISA Server2000 |
Windows 2000 with SP1 min./Eval is Free |
No |
http:// www.microsoft.com/ isaserver/evaluation /trial/default.asp |
IPv6 protocol |
Any/Free |
Yes |
http:// msdn.microsoft.com /downloads/sdks/ platform/tpipv6/ download.asp |
Webmin |
Any (Browser based management.)/Free |
Yes |
http://www.webmin.com (There you will find lots of GUI goodies, including
an IPchains [or IPtables] configurator).
|
Bastille |
Linux/Free |
Yes |
http://www.bastille-linux.org/ |
pwlib-1.3.3-5.i386.rpm |
Linux/Free |
Yes |
http:// www.bastille-linux.org /pwlib-1.3.3-5.i386.rpm |
perl-TK-800.023-9mdk.i586.rpm |
Linux/Free |
Yes |
http:// www.bastille-linux.org /perl-TK-800.023-9mdk.i586.rpm |
PuTTY.exe |
Windows/Free |
Yes |
http:// www.chiark.greenend.org.uk /~sgtatham/putty/ |
HiSecWeb security template |
Windows/Free |
Yes |
http://support.microsoft.com/ support/misc/ kblookup.asp?id=Q316347 |
IIS Lockdown tool |
Windows/Free |
Yes |
http://www.microsoft.com /downloads/ release.asp?ReleaseID=43955 |
HFNetChk |
Windows/Free |
Yes |
http://www.microsoft.com /downloads/ search.aspx?displaylang=en (Select
HFNetChk from the Product/Technology drop-down list, and download Nsch332.exe.)
|
Performance-Based Objectives
- Investigate advanced concepts and procedures related to the TCP/IP
protocol.
- Work with the secure version of IP, IPSec.
- Secure Linux computers and networks.
- Secure Windows 2000 computers and test the effectiveness of various
security measures.
- Secure routers by using Access Control Lists and logging options.
- Investigate measures that can help ensure business continuity in
the event of a disaster, such as contingency planning, and power and backup
issues.
- Define common Internet components and identify techniques used
in Web hacking and other attacks.
- Examine and work with common techniques used to attack networks
and specific operating systems.
Course duration
5 Days
Course outline
Lesson 1: Advanced TCP/IP
- Topic 1A: TCP/IP Concepts
- Topic 1B: Analyzing the Three-Way Handshake
- Topic 1C: Capturing and Identifying IP Datagrams
- Topic 1D: Capturing and Identifying ICMP Messages
- Topic 1E: Capturing and Identifying TCP Headers
- Topic 1F: Capturing and Identifying UDP Headers
- Topic 1G: Analyzing Packet Fragmentation
- Topic 1H: Analyzing an Entire Session
- Topic 1I: Fundamentals of IPv6
Lesson 2: Implementing IPSec
- Topic 2A: Internet Protocol Security
- Topic 2B: IPSec Policy Management
- Topic 2C: IPSec AH Implementation
- Topic 2D: IPSec ESP Implementation
- Topic 2E: Combining AH and ESP in IPSec
Lesson 3: Hardening Linux Computers
- Topic 3A: Introduction to Linux Administration
- Topic 3B: Fundamental Linux Security
- Topic 3C: Access Control
- Topic 3D: Securing Network Services
- Topic 3E: Final OS Hardening
Lesson 4: Hardening Windows Computers
- Topic 4A: Windows 2000 Infrastructure Security
- Topic 4B: Windows 2000 Authentication
- Topic 4C: Windows 2000 Security Configuration Tools
- Topic 4D: Windows 2000 Resource Security
- Topic 4E: Windows 2000 Auditing and Logging
- Topic 4F: Windows 2000 EFS
- Topic 4G: Windows 2000 Network Security
Lesson 5: Routers and Access Control Lists
- Topic 5A: Fundamental Cisco Security
- Topic 5B: Routing Principles
- Topic 5C: Removing Protocols and Services
- Topic 5D: Creating Access Control Lists
- Topic 5E: Implementing Access Control Lists
- Topic 5F: Logging Concepts
Lesson 6: Contingency Planning
- Topic 6A: Continuity and Recovery
- Topic 6B: Developing the Plan
- Topic 6C: The Technologies of Staying On
- Topic 6D: Backing up the Operating Systems
Lesson 7: Security on the Internet and the WWW
- Topic 7A: Describing the Components of the Internet
- Topic 7B: Identifying the Weak Points of the Internet
- Topic 7C: Describing Web-Hacking Techniques
- Topic 7D: Describing Methods Used to Attack Users
Lesson 8: Attack Techniques
- Topic 8A: Network Reconnaissance
- Topic 8B: Mapping the Network
- Topic 8C: Sweeping the Network
- Topic 8D: Scanning the Network
- Topic 8E: Viruses, Worms, and Trojan Horses
- Topic 8F: Malicious Web sites
- Topic 8G: Gaining Control over the System
- Topic 8H: Recording Keystrokes
- Topic 8I: Cracking Encrypted Passwords
- Topic 8J: Revealing Hidden Passwords
- Topic 8K: Social Engineering
- Topic 8L: Case Study: Social Engineering
- Topic 8M: Gaining Unauthorized Access
- Topic 8N: Hiding Evidence of an Attack
- Topic 8O: Performing a Denial of Service
|