Infrastructure Security: First Line of Defense - Training Courses | Afi U.
afiU logo
Explore our 2025-2026 catalogue View all courses
Training and Coaching

Cultivate a learning organization and develop talent.

Customer Experience

Optimize your processes for operational excellence.

Employee Experience

Engage, empower, and enhance employee well-being.

Artificial Intelligence

Master AI and automate your processes.

Leadership

Develop key skills to inspire and mobilize.

Digital Tools

Boost collaboration and productivity within your teams

Strategy and Performance

Align your goals for sustainable growth.

Digital Transformation

Leverage technology to innovate and accelerate your growth.

ContactFAQ

New

Infrastructure Security: First Line of Defense

Strengthen your IT infrastructure and learn to manage patches, access, and incidents to defend against cyberattacks.
Private session

This training is available in a private or personalized format. It can be provided in one of our training centres or at your offices. Call one of our consultants of submit a request online.

Call now at 1 877 624.2344

  • Duration: 1 day
  • Regular price: On request

Course outline

Duration : 1 Day

© AFI par Edgenda inc.

This course focuses on hardening IT infrastructure, covering system administration best practices, patch management, and incident response. Participants will learn how to defend infrastructure as the first line of cybersecurity.

Audience

System administrators, IT operations staff, and network administrators.

Prerequisites

  • Experience managing IT systems (Windows/Linux)
  • Familiarity with networking basics

Objectives

  • Harden servers, endpoints, and networks
  • Implement effective patch and access management
  • Monitor and detect threats with logging tools
  • Respond effectively to incidents

Contents

Module 1: Fundamentals of Infrastructure Security

  • Threat landscape for system administrators
  • Defense-in-depth principles
  • Role of infrastructure in organizational resilience

Module 2: Hardening Systems and Networks

  • Patching and vulnerability management
  • Network segmentation and firewalls
  • Identity and access management

Module 3: Monitoring and Detection

  • Logging and SIEM fundamentals
  • Detecting suspicious activities
  • Use of intrusion detection/prevention systems

Module 4: Incident Response for Administrators

  • Steps in incident response
  • Containment, eradication, recovery
  • Communication and escalation

Related courses

Course material

  • Ransomware Defense and Recovery
  • Zero Trust Architecture

System hardening guides and security tools documentation provided.