Training > Cybersecurity > Mastering Infrastructure Security: Strategies, Tools, and Practices (SKF200)
Training Course

Mastering Infrastructure Security: Strategies, Tools, and Practices (SKF200)

Empower yourself with the essential skills to fortify digital architectures against contemporary and emerging threats.

Who Is It For

This course is designed for developers aiming to deepen their understanding of infrastructure security and management. It is ideal for those who wish to enhance their knowledge in network penetration testing and infrastructure security skills.
read less read more
What You’ll Learn

Explore the fundamental elements needed to establish and maintain a secure infrastructure configuration and the principles and techniques of network penetration testing to identify potential security vulnerabilities.
read less read more
What It Prepares You For

By the end of this course, you should be able to fortify digital architectures against contemporary and emerging threats as well as navigate the intricate landscape of infrastructure security.
read less read more
Course Outline
Chapter 1. Course Introduction
Chapter 2. Introduction to Infrastructure & Ops Security
Chapter 3. Phases of Hacking
Chapter 4. Reconnaissance - The First Step of Hacking
Chapter 5. Scanning, Identifying Vulnerabilities, and Mapping the Network
Chapter 6. Gaining Access: The Art of Exploitation
Chapter 7. Mapping and Information Gathering
Chapter 8. Service Enumeration and Subdomain Takeover
Chapter 9. Default Pages, Backup Files, and Application Versions
Chapter 10. Command Injection Attacks
Chapter 11. Privilege Escalation - Linux
Chapter 12. Privilege Escalation - Windows
Chapter 13. Security, TLS, and Configuration
Chapter 14. Labs - Basic to Advanced

To get the most possible value from this course, you should be familiar with the following:

  • General IT concepts, including operating systems, networking, and cloud computing.
  • Programming Skills: While not a strict requirement, basic programming skills can be beneficial, especially in scripting languages such as Python or Bash.
  • Fundamental networking principles, including TCP/IP, DNS, routing, and subnetting.
  • Basic elements of infrastructure, like servers, databases, and network equipment, would be advantageous.
  • Common security threats, vulnerabilities, and best practices for secure coding and infrastructure management.
  • Ability to approach complex problems methodically, use logical reasoning, and implement effective solutions.
Lab Info
In order to complete this course, you should have the following:

    • Reliable Internet Connection: A strong and stable internet connection is required for optimal learning and interaction during the labs. We recommend a broadband connection with a minimum speed of 10 Mbps for the best experience.
    • Up-to-date Browser: For seamless access to all course materials, please ensure you’re using a modern, up-to-date web browser. Google Chrome, Mozilla Firefox, Microsoft Edge, or Safari are recommended. Ensure your browser is updated to the latest version to avoid compatibility issues.
    • JavaScript Enabled: As our labs may require interactive components, make sure JavaScript is enabled in your browser settings.
    • Pop-Up Blocker Disabled: Certain aspects of the lab may open in new windows or tabs, so disabling pop-up blockers for the course website is advised.
    • Screen Resolution: A minimum screen resolution of 1024×768 for the best viewing and interaction with the course content.