Login

OTP sent to

Certified Network Defender - CND

Home > Courses > Certified Network Defender - CND

Certified Network Defender - CND

EC Council Courses

Duration
45 Hours

Course Description


        The Certified Network Defender (CND) course provides comprehensive training on protecting, detecting, and responding to network threats, equipping individuals with practical skills in network security. It covers network security fundamentals, defense strategies, and incident response techniques, preparing participants to manage and secure networks against cyber threats. The course includes hands-on labs, real-world scenarios, and is mapped to cybersecurity frameworks and DoD job roles. 

Course Outline For Certified Network Defender - CND

  • 1. Network Attacks and Defense Strategies: Introduces network attacks and defense mechanisms, including attack and defense frameworks like the Cyber Kill Chain and the MITRE ATT&CK Framework.
  • 2. Administrative Network Security: Covers developing and implementing security policies, ensuring compliance, and managing network access.
  • 3. Technical Network Security: Focuses on implementing and managing security controls and protocols for network infrastructure and data transmission.
  • 4. Network Perimeter Security: Deals with protecting the network perimeter using firewalls, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), and other security measures.
  • 5. Endpoint Security - Windows Systems: Covers securing Windows-based endpoints, including workstations and servers, through hardening, patching, and access control.
  • 6. Endpoint Security - Linux Systems: Focuses on securing Linux-based endpoints, covering installation, hardening, access control, and network security.
  • 7. Endpoint Security - Mobile Devices: Addresses security challenges and best practices for securing mobile devices, such as smartphones and tablets, within the enterprise environment.
  • 8. Endpoint Security - IoT Devices: Covers the security challenges and measures related to the proliferation of IoT devices in organizations.
  • 9. Administrative Application Security: Focuses on securing applications through techniques like whitelisting, blacklisting, sandboxing, and Web Application Firewalls (WAF).
  • 10. Data Security: Covers concepts and techniques for protecting data at rest and in transit, including encryption, data backup, data destruction, and Data Loss Prevention (DLP).
  • 11. Enterprise Virtual Network Security: Deals with the security of virtual networks, Software-Defined Networks (SDN), Network Function Virtualization (NFV), Docker, Kubernetes, and container security.
  • 12. Enterprise Cloud Network Security: Focuses on securing cloud environments and services across platforms like AWS, Microsoft Azure, and Google Cloud Platform.
  • 13. Enterprise Wireless Network Security: Covers securing wireless networks using encryption, authentication, and countermeasures against wireless attacks.
  • 14. Network Traffic Monitoring and Analysis: Emphasizes the importance of network traffic monitoring and analysis to detect anomalies and potential threats.
  • 15. Network Logs Monitoring and Analysis: Focuses on logging, log analysis on different systems and devices, and centralized log management.
  • 16. Incident Response and Forensic Investigation: Introduces the Incident Response and Handling (IH&R) process and forensic investigation techniques.
  • 17. Business Continuity and Disaster Recovery: Covers the concepts and planning involved in business continuity and disaster recovery to ensure organizational resilience.
  • 18. Risk Anticipation with Risk Management: Addresses risk management concepts, frameworks, and programs, including vulnerability management and assessment.
  • 19. Threat Assessment with Attack Surface Analysis: Focuses on understanding, visualizing, and analyzing an organization's attack surface to reduce and mitigate potential threats.
  • 20. Threat Prediction with Cyber Threat Intelligence: Covers cyber threat intelligence, its types, sources, and integration into proactive defense strategies. 
Enquire Now