EC-Council Certified Network Defender (CND)

 

Course Overview

C|ND prepares network defenders with strategic, tactical, and operational network security capabilities, enabling them to design, develop, and maintain secure networks.

Who should attend

  • Network Administrators
  • Network Security Administrators
  • Network Engineer
  • Data Security Analyst
  • Network Security Engineer
  • Network Defense Technician
  • Security Analyst
  • Security Operator
  • Network security
  • Cybersecurity Engineer

Prerequisites

Basic Knowledge in Networking Concepts

Course Objectives

  • Plan, implement, and administer network security management for an organization.
  • Gain knowledge of various security risks, threats, and vulnerabilities.
  • Assist in obtaining and maintaining an organization's compliance with required regulatory standards and frameworks.
  • Design and implement network security policies and procedures .
  • Apply security principles, protocols, and controls that suit today's distributed and mobile computing environment.
  • Apply strong Identity and Access Management (IAM), network segmentation, and encryption techniques to strengthen the organization's network.
  • Manage and maintain Windows Security Administration.
  • Manage and maintain Linux Security Administration.
  • Manage and mitigate the security risks and challenges associated with the enterprise's mobile device usage policies.
  • Manage and mitigate the security risks and challenges associated with IoT devices used in enterprises.
  • Implement strong data security techniques to secure an organization's data.
  • Implement and manage the security of virtualization technologies, i.e., Network Virtualization (NV), Software Defined Network (SDN),
  • Network Function Virtualization (NFV), OS Virtualization, Containers, Dockers, and Kubernetes used in modern-day networks.
  • Implement and manage cloud security on various cloud platforms such as AWS, Azure, Google Cloud Platform, etc.
  • Implement and manage wireless network security.
  • Perform risk assessment and vulnerability assessment/scanning through various scanning tools and generate detailed reports.
  • Identify the critical data and choose an appropriate backup method, media, and technique to regularly perform a successful backup of organization data.
  • Provide a first response to the network security incident and assist the IRT and forensics investigation teams in dealing with an incident.
  • Identify the Indicators of Compromise (IoC) and Indicators of Attack (IoA) on networks .
  • Integrate threat intelligence capabilities to leverage/consume threat intelligence for proactive defense.
  • Conduct attack surface analysis by identifying Indicators of Exposures (IoE).
  • Assist in Business Continuity (BC) and Disaster Recovery (DR) planning.
  • Monitor network traffic and ensure its security .
  • Perform log management.
  • Monitor network logs against any anomalies.
  • Manage proxy and content filtering .
  • Troubleshoot the network for various network problems.
  • Identify various threats to an organization’s network .
  • Harden security of various endpoints individually in the organization’s network .
  • Select the appropriate firewall solution, topology, and configurations to harden security through the firewall.
  • Determine an appropriate location for IDS/IPS sensors, tuning IDS for false positives and false negatives, and configurations to harden security through IDPS technologies
  • Maintain the inventory of computers, servers, terminals, modems, and other access devices .
  • Provide security awareness guidance and training.
  • Add, remove, or update user account information.
  • Apply operating system updates and patches and make configuration changes.
  • Update system configurations to maintain an updated security posture using current patches, device and operating system hardening techniques, and access control lists.
  • Manage network authentication, authorization, and accounting (AAA) for network devices.
  • Review audit logs from the Firewall, IDS/IPS, servers, and hosts on the internal, protected network.
  • Analyze, troubleshoot, and investigate security-related information systems’ anomalies based on the security platform.
  • Maintain, configure, and analyze network and host-based security platforms.
  • Evaluate security products as well as security operations procedures and processes.
  • Identify and classify organizational assets, including hardware, software, data, and critical infrastructure.
  • Implement system integrity monitoring tools and techniques to identify alterations in critical files, configurations, or system states.
  • Understand the role and functionality of EDR/XDR solutions implemented to contain and remediate threats.
  • Understand the role and functionality of UEBA solutions implemented to monitor and analyze user and entity activities for anomalous behavior patterns.
  • Conduct PIA processes to evaluate and assess the potential impact of new systems, processes, or initiatives on individual privacy.
  • Collaborate with security teams to enhance threat-hunting strategies and incident response capabilities.
  • Understand the role of Security Orchestration, Automation, and Response (SOAR) platforms in cybersecurity operations.
  • Plan and execute the integration of zero trust principles into existing security architectures and infrastructures.
  • Stay updated about the newly emerging cyber threats with the help of the latest cybersecurity news, industry publications, and reputable sources of information, including security blogs, research reports, and whitepapers.
  • Understand the role of AI/ML in enhancing cyber defense, threat detection, and response.

Course Content

  • Network Attacks and Defense Strategies
  • Administrative Network Security
  • Technical Network Security
  • Network Perimeter Security
  • Endpoint Security-Windows Systems
  • Endpoint Security-Linux Systems
  • Endpoint Security- Mobile Devices
  • Endpoint Security-IoT Devices
  • Administrative Application Security
  • Data Security
  • Enterprise Virtual Network Security
  • Enterprise Cloud Network Security
  • Enterprise Wireless Network Security
  • Network Traffic Monitoring and Analysis
  • Network Logs Monitoring and Analysis
  • Incident Response and Forensic Investigation
  • Business Continuity and Disaster Recovery
  • Risk Anticipation with Risk Management
  • Threat Assessment with Attack Surface Analysis
  • Threat Prediction with Cyber Threat Intelligence

APPENDIX (Self-Study)

  • APPENDIX A: Computer Network Fundamentals
  • APPENDIX B: Physical Network Security
  • APPENDIX C: Virtual Private Network (VPN) Security
  • APPENDIX D: Endpoint Security – MAC Systems

Prices & Delivery methods

Online Training

Duration
5 days

Price
  • 13,700 ₪
Classroom Training

Duration
5 days

Price
  • Israel: 13,700 ₪

Schedule

English

1 hour difference

Online Training Time zone: Central European Time (CET)
Online Training Time zone: Central European Summer Time (CEST)
Online Training Time zone: Central European Summer Time (CEST)
Online Training Time zone: Central European Summer Time (CEST)

7 hours difference

Online Training Time zone: Eastern Standard Time (EST)
Online Training Time zone: Eastern Standard Time (EST)
Online Training Time zone: Eastern Daylight Time (EDT)
Instructor-led Online Training:   This computer icon in the schedule indicates that this date/time will be conducted as Instructor-Led Online Training.
This is a FLEX course, which is delivered both virtually and in the classroom. All FLEX courses are also Instructor-led Online Trainings (ILO).

Europe

Germany

Krefeld
Frankfurt
Munich
Hamburg
Hamburg

Switzerland

Zurich
Zurich
Zurich
Zurich
Zurich
Zurich
Zurich
This is a FLEX course, which is delivered both virtually and in the classroom. All FLEX courses are also Instructor-led Online Trainings (ILO).