Certified Network Defender (CND) Training
Commitment | 5 Days, 7-8 hours a day. |
Language | English |
User Ratings | Average User Rating 4.8 See what learners said |
Price | REQUEST |
Delivery Options | Instructor-Led Onsite, Online, and Classroom Live |
COURSE OVERVIEW
Learn about hackers and cyber defense strategies required in today’s critical infrastructure.
Certified Network Defender (CND) Training: EC-Council has reviewed the entire CND space as designated by the Department of Defense as IAT I, II, III, and IAM I, II, III as well as the NICE Framework KSA’s as they relate to cyber defense and day-to-day cyber operations. With each of these considered, they built their exam blueprint, and overall training scope, and got to work building the next certification we believe will be a game-changer for cyber security professionals – Certified Network Defender.
The class is a professional-level introduction to the cyber defense strategies needed in today’s critical infrastructure.
The Certified Network Defender Training (CND) exercises and class material prepare students on network security technologies and operations to attain Defense-in-Depth network security preparedness. It covers the protect, detect, and respond approach to network security. Additionally, the hands-on labs included with our Certified Network Defender (CND) are based on network security tools and techniques which provide real expertise on current network security technologies and operations.
WHAT'S INCLUDED?
- 5 Days of Certified Network Defender (CND) Training from an Authorized EC-Council Instructor
- Official EC-Council CND Training Courseware
- Official EC-Council CND Lab Manual
- CND Certification Exam Voucher
- 100% Satisfaction Guarantee
- Exam Pass Guarantee
RESOURCES
- Certified Network Defender (CND) – https://www.wiley.com/
- Certified Network Defender (CND) – https://www.packtpub.com/
- Certified Network Defender (CND) – https://store.logicaloperations.com/
- Certified Network Defender (CND) – https://us.artechhouse.com/
- Certified Network Defender (CND) Training – https://www.amazon.com/
RELATED COURSES
- Certified Authorization Professional Training (CAP)
- Computer Hacking Forensics Investigator Training (CHFI)
- Certified Information Systems Auditor Training (CISA)
- Certified Information Systems Security Professional Training (CISSP)
- Certified Information Security Manager Training (CISM)
- Certified in Risk and Information Systems Control Training (CRISC)
- Certified Penetration Testing Engineer Training (CPTE)
- Certified Digital Forensics Examiner Training (CDFE)
- Certified Disaster Recovery Engineer Training (CDRE)
- Certified Network Forensics Examiner Training (CNFE)
- Certified Secure Web Application Engineer Training (CSWAE)
- Certified Professional Ethical Hacker Training (CPEH)
ADDITIONAL INFORMATION
COURSE OBJECTIVES
Upon completing this Certified Network Defender (CND) Training course, learners will be able to meet these objectives:
- Network security management
- Network security policies and procedures
- Windows and Linux security administration
- Mobile and IoT device security
- Data security techniques
- Virtualization technology security
- Cloud and wireless security
- Risk assessment tools
- Basics of first response and forensics
- Indicators of Compromise, Attack, and Exposures (IoC, IoA, IoE)
- Threat intelligence capabilities
- Log management
- Endpoint security
- Firewall solutions
- IDS/IPS technologies
- Network Authentication, Authorization, Accounting (AAA)
CUSTOMIZE IT
- We can adapt this Certified Network Defender (CND) Training course to your group’s background and work requirements at little to no added cost.
- If you are familiar with some aspects of this Certified Network Defender (CND) course, we can omit or shorten their discussion.
- We can adjust the emphasis placed on the various topics or build the Certified Network Defender (CND) around the mix of technologies of interest to you (including technologies other than those included in this outline).
- If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Certified Network Defender (CND) course in a manner understandable to lay audiences.
AUDIENCE/TARGET GROUP
The intended audience for our Certified Network Defender (CND) Training program is an IT professional who is focused on network operations, specifically those who work with network security technologies and operations. CND is generally a great fit for those working in roles such as, but not limited to:
- Network Administrators
- Network Security Administrators
- Network Security Engineers
- Network Defense Technicians
- CND Analyst
- Security Analyst
- Security Operator
- Anyone involved with network operations
CLASS PREREQUISITES
You should be well-versed in cyber security fundamentals before attempting Certified Network Defender (CND) Training.
COURSE SYLLABUS
This official EC-Council Certified Network Defender (CND) Training seminar reviews all 20 comprehensive modules that were created by EC-Council for CND, ensuring our students successfully prepare for the CND certification exam while also enhancing their overall competencies in network security.
- Module 01: Network Attacks and Defense Strategies
- Module 02: Administrative Network Security
- Module 03: Technical Network Security
- Module 04: Network Perimeter Security
- Module 05: Endpoint Security-Windows Systems
- Module 06: Endpoint Security-Linux Systems
- Module 07: Endpoint Security- Mobile Devices
- Module 08: Endpoint Security-IoT Devices
- Module 09: Administrative Application Security
- Module 10: Data Security
- Module 11: Enterprise Virtual Network Security
- Module 12: Enterprise Cloud Network Security
- Module 13: Enterprise Wireless Network Security
- Module 14: Network Traffic Monitoring and Analysis
- Module 15: Network Logs Monitoring and Analysis
- Module 16: Incident Response and Forensic Investigation
- Module 17: Business Continuity and Disaster Recovery
- Module 18: Risk Anticipation with Risk Management
- Module 19: Threat Assessment with Attack Surface Analysis
- Module 20: Threat Prediction with Cyber Threat Intelligence