Introduction:
Certified Network Defender Training (CND) or CND Certification Training Course with Hands-On Labs (Online or Classroom Live)
The Certified Network Defender (CND) certification program focuses on creating Network Administrators who are trained on protecting, detecting and responding to the threats on the network. Network administrators are usually familiar with network components, traffic, performance and utilization, network topology, location of each system, security policy, etc. CND is a skills-based, lab intensive course based on a job-task analysis and cybersecurity education framework presented by the National Initiative for Cybersecurity Education (NICE). This official EC-Council Certified Network Defender Training (CND) course has also been mapped to global job roles and responsibilities and the Department of Defense (DoD) job roles for system/network administrators.
The Certified Network Defender Training (CND) exercises and class material prepares students on network security technologies and operations to attain Defense-in-Depth network security preparedness. It covers the protect, detect and respond approach to network security. Additionally, the hands-on labs included with our CND training is based on network security tools and techniques which provide real expertise on current network security technologies and operations.
Aside from a reserved seat in an upcoming CND Certification Training seminar, the resources provided with registration include official EC-Council courseware along with a CND exam voucher. Not only that, but you will also gain access to a number of EC-Council’s self-paced resources including their online lab environment (iLabs). When you combine the instructor-led training with the course resources, this official EC-Council training program is a great tool for those interested in gaining either network defense skills, the CND certification, or both.
This Computer Hacking Forensic Investigator Training (CHFI) course supports a certification that is a DoD Approved 8570 Baseline Certification and meets DoD 8140/8570 training requirements.
Your Registration Includes
- 5 Days of CND Training from an Authorized EC-Council Instructor
- Official EC-Council CND Training Courseware
- Official EC-Council CND Training Lab Manual
- CND Test Prep Program
- CND certification Exam voucher
- 100% Satisfaction Guarantee
- Exam Pass Guarantee
Duration: 5 days
Related Courses:
- Cybersecurity Foundations
- CISSP Certification Training | Certified Information Systems Security Professional
- CISA Certification Training | Certified Information Systems Auditor
- CISM Certification Training | Certified Information Security Manager
- CIPP Certification Training | Certified Information Privacy Professional
- CSSLP Certification Training | Certified Secure Software Lifecycle Professional Training
Resources:
- Certified Network Defender Training (CND) Study Guide by EC-Council – eBook w/ iLabs/Vitalsource.com
- Certified Network Defender Training (CND) Exams Questions by EC-Council – Paperback/Kindle – Amazon
- Certified Network Defender Training (CND) Study Guide by IP Specialist – Paperback/Kindle – Amazon
- Certified Network Defender Training (CND) Guide by EC-Council – Hardcover /Amazon
- Certified Network Defender Training (CND) Complete Guide By: EC-Council – Hardcover/vitalsource.com
- Certified Network Defender Training (CND) Dave Kleiman – Paperback/iclass.eccouncil.org
Certified Network Defender Training (CND) – Customize It:
- If you are familiar with some aspects of CND Certification Training, we can omit or shorten their discussion.
- We can adjust the emphasis placed on the various topics or build the CND Certification Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
- If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the CND Certification Training course in manner understandable to lay audiences.
Certified Network Defender Training (CND) – Audience / Target Group:
The intended audience for our CND Certification training program is an IT professional who is focused on network operations, specifically those who work with network security technologies and operations. CND is generally a great fit for those working in roles such as, but not limited to:
- Network Administrators
- Network Security Administrators
- Network Security Engineers
- Network Defense Technicians
- CND Analyst
- Security Analyst
- Security Operator
- Anyone involved with network operations
Certified Network Defender Training (CND) – Prerequisites:
The knowledge and skills that a learner must have before attending this CND Certification Training course are:
- Recommended: An understanding of UNIX, Linux, and Windows
- Recommended: Familiarity with TCP/IP
- Recommended: Security+ Certification Prep Course
- Recommended: Cybersecurity Foundations
Certified Network Defender Training (CND) – Objectives:
This official EC-Council CND Certification Training seminar reviews all 14 comprehensive modules that were created by EC-Council for CND, ensuring our students successfully prepare for the CND certification exam while also enhancing their overall competencies in network security.
- Students will learn about various network security controls, protocols, and devices
- Students will able to troubleshoot their network for various network problems
- Students will able to identify various threats on the organization network
- Students will learn how to design and implement various security policies for their organizations
- Students will learn the importance of physical security and the ability to determine and implement various physical security controls for their organizations
- Students will able to harden the security of various hosts individually in the organization’s network
- Students will able to choose the appropriate firewall solution, topology, and configurations to harden security through a firewall
- Students will able to determine the appropriate location for IDS/IPS sensors, tuning IDS for false positives and false negatives, and configurations to harden security through IDPS technologies
- Students will able to implement secure VPN implementation for their organization
- Students will able to identify various threats to a wireless network and learn how to mitigate them
- Students will able to monitor and conduct signature analysis to detect various types of attacks and policy violation activities.
- Students will able to perform risk assessment, vulnerability assessment/scanning through various scanning tools and generate detailed reports on it
- Students will able to identify the critical data, choose an appropriate backup method, media, and technique to perform a successful backup of organization data on a regular basis
- Students will able to provide the first response to the network security incident and assist the IRT team and forensics investigation team in dealing with an incident.
Certified Network Defender Training (CND) – Course Syllabus:
Module 1 – Computer Network Defense Fundamentals
- Network Fundamentals
- Network Components
- TCP/IP Networking Basics
- TCP/IP Protocol Stack
- IP Addressing
- Computer Network Defense (CND)
- CND Triad
- CND Process
- CND Actions
- CND Approaches
Module 02 – Network Security Threats, Vulnerabilities, and Attacks
- Essential Terminologies
- Network Security Concerns
- Network Security Vulnerabilities
- Network Reconnaissance Attacks
- Network Access Attacks
- Denial of Service (DoS) Attacks
- Distributed Denial-of-Service Attack (DDoS)
- Malware Attacks
Module 03 – Network Security Controls, Protocols, and Devices
- Fundamental Elements of Network Security
- Network Security Controls
- User Identification, Authentication, Authorization, and Accounting
- Types of Authorization Systems
- Authorization Principles
- Cryptography
- Security Policy
- Network Security Devices
- Network Security Protocols
Module 04 – Network Security Policy Design and Implementation
- What is Security Policy?
- Internet Access Policies
- Acceptable-Use Policy
- User-Account Policy
- Remote-Access Policy
- Information-Protection Policy
- Firewall-Management Policy
- Special-Access Policy
- Network-Connection Policy
- Business-Partner Policy
- Email Security Policy
- Passwords Policy
- Physical Security Policy
- Information System Security Policy
- Bring Your Own Devices (BYOD) Policy
- Software/Application Security Policy
- Data Backup Policy
- Confidential Data Policy
- Data Classification Policy
- Internet Usage Policies
- Server Policy
- Wireless Network Policy
- Incidence Response Plan (IRP)
- User Access Control Policy
- Switch Security Policy
- Intrusion Detection and Prevention (IDS/IPS) Policy
- Personal Device Usage Policy
- Encryption Policy
- Router Policy
- Security Policy Training and Awareness
- ISO Information Security Standards
- Payment Card Industry Data Security Standard (PCI-DSS)
- Health Insurance Portability and Accountability Act (HIPAA)
- Information Security Acts – Sarbanes Oxley Act (SOX)
- Information Security Acts – Gramm-Leach-Bliley Act (GLBA)
- Information Security Acts – The Digital Millennium Copyright Act (DMCA) and the Federal Information Security Management Act (FISMA)
- Other Information Security Acts and Laws
Module 05 – Physical Security
- Physical Security
- Access Control Authentication Techniques
- Physical Security Controls
- Other Physical Security Measures
- Workplace Security
- Personnel Security – Managing Staff Hiring and Leaving Process
- Laptop Security Tool – EXO5
- Environmental Controls
- Physical Security – Awareness /Training
- Physical Security Checklists
Module 06 – Host Security
- Host Security
- OS Security
- Linux Security
- Securing Network Servers
- Hardening Routers and Switches
- Application/Software Security
- Data Security
- Virtualization Security
Module 07 – Secure Firewall Configuration and Management
- Firewalls and Concerns
- What Firewalls Does?
- What should you not Ignore? – Firewall Limitations
- How Does a Firewall Work?
- Firewall Rules
- Types of Firewalls
- Firewall Technologies
- Firewall Topologies
- Firewall Rule Set & Policies
- Firewall Implementation
- Firewall Administration
- Firewall Logging and Auditing
- Firewall Anti-evasion Techniques
- Why Firewalls are Bypassed?
- Full Data Traffic Normalization
- Data Stream-based Inspection
- Vulnerability-based Detection and Blocking
- Firewall Security Recommendations and Best Practices
- Firewall Security Auditing Tools
Module 08 – Secure IDS Configuration and Management
- Intrusions and IDPS
- IDS
- Types of IDS Implementation
- IDS Deployment Strategies
- Types of IDS Alerts
- IPS
- IDPS Product Selection Considerations
- IDS Counterparts
Module 09 – Secure VPN Configuration and Management
- Understanding Virtual Private Network (VPN)
- How VPN works?
- Why Establish a VPN?
- VPN Components
- VPN Concentrators
- Types of VPN
- VPN Categories
- Selecting Appropriate VPN
- VPN Core Functions
- VPN Technologies
- VPN Topologies
- Common VPN Flaws
- VPN Security
- Quality Of Service and Performance in VPNs
Module 10 – Wireless Network Defense
- Wireless Terminologies
- Wireless Networks
- Wireless Standard
- Wireless Topologies
- Typical Use of Wireless Networks
- Components of Wireless Network
- WEP (Wired Equivalent Privacy) Encryption
- WPA (Wi-Fi Protected Access) Encryption
- WPA2 Encryption
- WEP vs. WPA vs. WPA2
- Wi-Fi Authentication Method
- Wi-Fi Authentication Process Using a Centralized Authentication Server
- Wireless Network Threats
- Bluetooth Threats
- Wireless Network Security
- Wi-Fi Discovery Tools
- Locating Rogue Access points
- Protecting from Denial-of-Service Attacks – Interference
- Assessing Wireless Network Security
- Wi-Fi Security Auditing Tool – AirMagnet WiFi Analyzer
- WPA Security Assessment Tool
- Wi-Fi Vulnerability Scanning Tools
- Deploying Wireless IDS (WIDS) and Wireless IPS (WIPS)
- WIPS Tool
- Configuring Security on Wireless Routers
- Additional Wireless Network Security Guidelines
Module 11 – Network Traffic Monitoring and Analysis
- Network Traffic Monitoring and Analysis(Introduction)
- Network Monitoring – Positioning your Machine at an Appropriate Location
- Network Traffic Signatures
- Packet Sniffer – Wireshark
- Detecting OS Fingerprinting Attempts
- Detecting PING Sweep Attempt
- Detecting ARP Sweep/ ARP Scan Attempt
- Detecting TCP Scan Attempt
- Detecting SYN/FIN DDOS Attempt
- Detecting UDP Scan Attempt
- Detecting Password Cracking Attempts
- Detecting FTP Password Cracking Attempts
- Detecting Sniffing (MITM) Attempts
- Detecting the Mac Flooding Attempt
- Detecting the ARP Poisoning Attempt
- Additional Packet Sniffing Tools
- Network Monitoring and Analysis
- Bandwidth Monitoring
Module 12 – Network Risk and Vulnerability Management
- What is Risk?
- Risk Levels
- Risk Matrix
- Key Risk Indicators(KRI)
- Risk Management Phase
- Enterprise Network Risk Management
- Vulnerability Management
Module 13 – Data Backup and Recovery
- Introduction to Data Backup
- RAID (Redundant Array Of Independent Disks) Technology
- Storage Area Network (SAN)
- Network Attached Storage (NAS)
- Selecting Appropriate Backup Method
- Choosing the Right Location for Backup
- Backup Types
- Conducting Recovery Drill Test
- Data Recovery
- Windows Data Recovery Tool
- RAID Data Recovery Services
- SAN Data Recovery Software
- NAS Data Recovery Services
Module 14 – Network Incident Response and Management
- Incident Handling and Response
- Incident Response Team Members – Roles and Responsibilities
- First Responder
- Incident Handling and Response Process
- Overview of IH&R Process Flow
Certified Network Defender Training (CND) Course Wrap-Up
Whether you are looking for general information or have a specific question, we want to help!
Request More Information