Certified Network Defender

Course DateStart TimeEnd TimeTime ZoneLocationDaysPrice
Call for In Class or Live Virtual Dates5$4,200 CADPurchase


CND

Certified Network Defender

The CND certification program focuses on training Network Administrators to protect, detect, respond to, and predict threats on the network.  This builds upon the typical knowledge and skills of Network Administrators in network components, traffic, performance and utilization, network topology, system locations, and security policies.

Duration: 5 days

Audience

CND v2 is for those who work in the network administration/cybersecurity domain in the capacity of Network Administrator/Engineer, Network Security Administrator/Engineer/Analyst, Cybersecurity Engineer, Security Analyst, Network Defense Technician, Security Operator. CND v2 is for all cybersecurity operations, roles, and anyone looking to build a career in cybersecurity.

Learning Objectives

  • Understanding network security management
  • Learn basics of first response and forensics
  • Establishing network security policies and procedures
  • Understanding indicators of Compromise, Attach, and Exposures (IoC, IoA, IoE)
  • Windows and Linux security administration
  • Building threat intelligence capabilities
  • Setting up mobile and IoT device security
  • Establishing and monitoring log management
  • Implementing data security techniques on networks
  • Implementing endpoint security
  • Embedding virtualization technology security
  • Configuring optimum firewall solutions
  • Determining cloud and wireless security
  • Understanding and using IDS/IPS technologies
  • Deploying and using risk assessment tools
  • Establishing Network Authentication, Authorization, Accounting (AAA)

Topics

  • Network Attacks and Defense Strategies 
  • Administrative Network Security 
  • Technical Network Security 
  • Network Perimeter Security 
  • Endpoint Security-Windows Systems 
  • Endpoint Security-Linux Systems 
  • Endpoint Security- Mobile Devices 
  • Endpoint Security-IoT Devices 
  • Administrative Application Security 
  • Data Security 
  • Enterprise Virtual Network Security 
  • Enterprise Cloud Network Security 
  • Enterprise Wireless Network Security 
  • Network Traffic Monitoring and Analysis 
  • Network Logs Monitoring and Analysis 
  • Incident Response and Forensic Investigation 
  • Business Continuity and Disaster Recovery 
  • Risk Anticipation with Risk Management 
  • Threat Assessment with Attack Surface Analysis 
  • Threat Prediction with Cyber Threat Intelligence
Right Menu IconMENU