EC-Council Certified Network Defender (CND)
$3295.00
Course ID: CS-10045
Duration (Days): 5.0
Please contact us for additional details and scheduling options.
Contact UsThe EC-Council Certified Network Defender (CND) course offers comprehensive training in network security defenses and operations. It equips IT professionals with the skills needed to detect, respond to, and prevent network security threats, focusing on practical, hands-on experience in protecting and managing network infrastructures.
The EC-Council Certified Network Defender (CND) course is an extensive program designed to provide IT professionals with a deep understanding of network security principles and operational skills. This course covers a wide range of topics, including network threats and vulnerabilities, firewall configuration, intrusion detection and prevention systems, network traffic analysis, and security policies. It emphasizes a hands-on approach to learning, offering participants the opportunity to engage with real-world scenarios and security tools commonly used in network defense.
Through this course, participants will gain the knowledge necessary to design and implement robust network security strategies that can protect organizations from the evolving threats in today\'s cyber landscape. The curriculum also delves into the latest technologies and methods in network security, such as secure VPN configuration, understanding cryptographic principles, and conducting comprehensive risk assessments. Upon completion of the CND certification, professionals will be equipped with the skills to not only secure a network but also to identify and respond to security breaches, ensuring the integrity and reliability of organizational data and IT infrastructure.
Course Outline
##### Module 1 - Network Attacks and Defense Strategies
- Essential Terminologies Related to Network Security Attacks
- Examples of Network-level Attack Techniques
- Examples of Application-level Attack Techniques
- Examples of Social Engineering Attack Techniques
- Examples of Email Attack Techniques
- Examples of Mobile Device-specific Attack Techniques
- Examples of Cloud-specific Attack Techniques
- Examples of Wireless Network-specific Attack Techniques
- Attacker Hacking Methodologies and Frameworks
- Fundamental Goal, Benefits, and Challenges in Network Defense
- Continual/Adaptive Security Strategy
- Defense-in-Depth Security Strategy
##### Module 2 - Administrative Network Security
- Regulatory Frameworks Compliance
- Regulatory Frameworks, Laws, and Acts
- Design and Development of Security Policies
- Security Awareness Training
- Other Administrative Security Measures
##### Module 3 - Technical Network Security
- Principles of Access Control, Terminologies, and Different models
- Access Control in Today’s Distributed and Mobile Computing World
- Cryptographic Security Techniques
- Cryptographic Algorithms
- Security Benefits of Network Segmentation Techniques
- Essential Network Security Solutions
- Essential Network Security Protocols
##### Module 4 - Network Perimeter Security
- Firewall Security Concerns, Capabilities, and Limitations
- Different Types of Firewall Technologies and their Usage
- Firewall Topologies and their Usage
- Firewall Implementation and Deployment Process
- Firewall Administration Activities
- Role, Capabilities, Limitations, and Concerns in IDS Deployment
- IDS Classification
- Effective Deployment of Network and Host-Based IDS
- Dealing with False Positive and False Negative IDS Alerts
- Router and Switch Security Measures, Recommendations, and Best Practices
- Leveraging Zero-Trust Model Security using Software-Defined Perimeter (SDP)
##### Module 5 - Endpoint Security - Windows Systems
- Window OS and Security Concerns
- Windows Security Components
- Windows Security Features
- Windows Security Baseline Configurations
- Windows User Account and Password Management
- Windows Patch Management
- Windows User Access Management
- Windows OS Security Hardening Techniques
- Windows Active Directory Security Best Practices
- Windows Network Services and Protocol Security
##### Module 6 - Endpoint Security - Linux Systems
- Linux OS and Security Concerns
- Linux Installation and Patching
- Linux OS Hardening Techniques
- Linux User Access and Password Management
- Linux Network Security and Remote Access
- Linux Security Tools and Frameworks
##### Module 7 - Endpoint Security - Mobile Devices
- Common Mobile Usage Policies in Enterprises
- Security Risks and Guidelines Associated with Enterprise Mobile Usage Policies
- Implementing Various Enterprise-level Mobile Security Management Solutions
- Implementing the General Security Guidelines and Best Practices on Mobile Platforms
- Security Guidelines and Tools for Android Devices
- Security Guidelines and Tools for iOS Devices
##### Module 8 - Endpoint Security - IoT Devices
- IOT Devices Need and Application Areas
- IoT Ecosystem and Communication Models
- Security Challenges and Risks Associated with IoT-enabled Environments
- Security in IoT-Enabled Environments
- Security Measures for IoT-enabled IT Environments
- IoT Security Tools and Best Practices
- Various Standards, Initiatives, and Efforts for IoT Security
##### Module 9 - Administrative Application Security
- Implement Application Whitelisting and Blacklisting
- Implement Application Sandboxing
- Implement Application Patch Management
- Implement Web Application Firewalls
##### Module 10 - Data Security
- Data Security and Its Importance
- Implementation of Data Access Controls
- Implementation of “Data at Rest” Encryption
- Implementation of “Data in Transit” Encryption
- Data Masking Concepts
- Data Backup and Retention
- Data Destruction Concepts
- Data Loss Prevention Concepts
##### Module 11 - Enterprise Virtual Network Security
- Security Management in Virtualization-Enabled IT Environments
- Essential Virtualization Concepts
- Network Virtualization (NV) Security
- Software Defined Network (SDN) Security
- Network Function Virtualization (NFV) Security
- OS Virtualization Security
- Security Guidelines, Recommendations, and Best Practices for Containers
- Security Guidelines, Recommendations, and Best Practices for Dockers
- Security Guidelines, Recommendations, and Best Practices for Kubernetes
##### Module 12 - Enterprise Cloud Network Security
- Cloud Computing Fundamentals
- Cloud Security Insights
- Evaluating CSPs for Security Before Consuming a Cloud Service
- Security in Amazon Cloud (AWS)
- Security in Microsoft Azure Cloud
- Security in Google Cloud Platform (GCP)
- General Security Best Practices and Tools for Cloud Security
##### Module 13 - Enterprise Wireless Network Security
- Fundamentals of Wireless Networks
- Encryption Mechanisms Used in Wireless Networks
- Authentication Methods Used in Wireless Networks
- Various Security Measures in Wireless Networks
##### Module 14 - Network Traffic Monitoring and Analysis
- Need and Advantages of Network Traffic Monitoring
- Setting Up the Environment for Network Monitoring
- Baseline Traffic Signatures for Normal and Suspicious Network Traffic
- Network Monitoring and Analysis for Suspicious Traffic Using Wireshark
- Network Performance and Bandwidth Monitoring Concepts
##### Module 15 - Network Logs Monitoring and Analysis
- Logging Concepts
- Log Monitoring and Analysis on Windows Systems
- Log Monitoring and Analysis on Linux Systems
- Log Monitoring and Analysis on Mac Systems
- Log Monitoring and Analysis in Firewalls
- Log Monitoring and Analysis on Routers
- Log Monitoring and Analysis on Web Servers
- Centralized Log Monitoring and Analysis
##### Module 16 - Incident Response and Forensic Investigation
- Concept of Incident Response
- Role of First Responder in Incident Response
- Do’s and Don’ts in First Response
- Incident Handling and Response Process
- Forensics Investigation Process
##### Module 17 - Business Continuity and Disaster Recovery
- Business Continuity (BC) and Disaster Recovery (DR) Concepts
- BC/DR Activities
- Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP)
- BC/DR Standards
##### Module 18 - Risk Anticipation with Risk Management
- Risk Management Concepts
- Managing Risk though Risk Management Program
- Different Risk Management Frameworks (RMF)
- Managing Vulnerabilities through Vulnerability Management Program
- Vulnerability Scanning and Assessment
##### Module 19 - Threat Assessment with Attack Surface Analysis
- Attack Surface Analysis
- Attack Surface Visualization
- Identifying Indicators of Exposures (IoEs)
- Conducting Attack Simulation
- Reducing the Attack Surface
##### Module 20 - Threat Prediction with Cyber Threat Intelligence
- Role of Cyber Threat Intelligence in Network Defense
- Different Types of Threat Intelligence
- Indicators of Threat Intelligence: IoCs and IoAs
- Different Layers of Threat Intelligence
- Consuming Threat Intelligence for Proactive Defense