EC-Council Certified Network Defender (CND)

EC-Council Certified Network Defender (CND) Course Description

Duration: 5.00 days (40 hours)

Certified Network Defender (CND) is a comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and responsibilities and the Department of Defense (DoD) job roles for system/network administrators. The course is designed and developed after extensive market research and surveys.

The program prepares network administrators on network security technologies and operations to attain Defense-in-Depth network security preparedness. It covers the protect, detect and respond approach to network security. The course contains hands-on labs, based on major network security tools and techniques which will provide network administrators real world expertise on current network security technologies and operations.

Next Class Dates

Contact us to customize this class with your own dates, times and location. You can also call 1-888-563-8266 or chat live with a Learning Consultant.

Back to Top

Intended Audience for this EC-Council Certified Network Defender (CND) Course

  • » Network Administrators
  • » Network security Administrators
  • » Network Security Engineer
  • » Network Defense Technicians
  • » CND Analyst
  • » Security Analyst
  • » Security Operator
  • » Anyone who involves in network operations

Back to Top

EC-Council Certified Network Defender (CND) Course Objectives

  • » Computer Network and Defense Fundamentals
  • » Network Security Threats, Vulnerabilities, and Attacks
  • » Network Security Controls, Protocols, and Devices
  • » Network Security Policy Design and Implementation
  • » Physical Security
  • » Host Security
  • » Secure Firewall Configuration and Management
  • » Secure IDS Configuration and Management
  • » Secure VPN Configuration and Management
  • » Wireless Network Defense
  • » Network Traffic Monitoring and Analysis
  • » Network Risk and Vulnerability Management
  • » Data Backup and Recovery
  • » Network Incident Response and Management

Back to Top

EC-Council Certified Network Defender (CND) Course Outline

      1. Computer Network and Defense Fundamentals
        1. Network Fundamentals
        2. Network Components
        3. TCP/IP Networking Basics
        4. TCP/IP Protocol Stack
        5. IP Addressing
        6. Computer Network Defense (CND)
        7. CND Triad
        8. CND Process
        9. CND Actions
        10. CND Approaches
      2. Network Security Threats, Vulnerabilities, and Attacks
        1. Essential Terminologies
        2. Network Security Concerns
        3. Network Security Vulnerabilities
        4. Network Reconnaissance Attacks
        5. Network Access Attacks
        6. Denial of Service (DoS) Attacks
        7. Distributed Denial-of-Service Attack (DDoS)
        8. Malware Attacks
      3. Network Security Controls, Protocols, and Devices
        1. Fundamental Elements of Network Security
        2. Network Security Controls
        3. User Identification, Authentication, Authorization and Accounting
        4. Types of Authorization Systems
        5. Authorization Principles
        6. Cryptography
        7. Security Policy
        8. Network Security Devices
        9. Network Security Protocols
      4. Network Security Policy Design and Implementation
        1. What is Security Policy?
        2. Internet Access Policies
        3. Acceptable-Use Policy
        4. User-Account Policy
        5. Remote-Access Policy
        6. Information-Protection Policy
        7. Firewall-Management Policy
        8. Special-Access Policy
        9. Network-Connection Policy
        10. Business-Partner Policy
        11. Email Security Policy
        12. Passwords Policy
        13. Physical Security Policy
        14. Information System Security Policy
        15. Bring Your Own Devices (BYOD) Policy
        16. Software/Application Security Policy
        17. Data Backup Policy
        18. Confidential Data Policy
        19. Data Classification Policy
        20. Internet Usage Policies
        21. Server Policy
        22. Wireless Network Policy
        23. Incidence Response Plan (IRP)
        24. User Access Control Policy
        25. Switch Security Policy
        26. Intrusion Detection and Prevention (IDS/IPS) Policy
        27. Personal Device Usage Policy
        28. Encryption Policy
        29. Router Policy
        30. Security Policy Training and Awareness
        31. ISO Information Security Standards
        32. Payment Card Industry Data Security Standard (PCI-DSS)
        33. Health Insurance Portability and Accountability Act (HIPAA)
        34. Information Security Acts: Sarbanes Oxley Act (SOX)
        35. Information Security Acts: Gramm-Leach-Bliley Act (GLBA)
        36. Information Security Acts: The Digital Millennium Copyright Act (DMCA) and Federal
        37. Information Security Management Act (FISMA)
        38. Other Information Security Acts and Laws
      5. Physical Security
        1. Physical Security
        2. Access Control Authentication Techniques
        3. Physical Security Controls
        4. Other Physical Security Measures
        5. Workplace Security
        6. Personnel Security: Managing Staff Hiring and Leaving Process
        7. Laptop Security Tool: EXO5
        8. Environmental Controls
        9. Physical Security: Awareness /Training
        10. Physical Security Checklists
      6. Host Security
        1. Host Security
        2. OS Security
        3. Linux Security
        4. Securing Network Servers
        5. Hardening Routers and Switches
        6. Application/software Security
        7. Data Security
        8. Virtualization Security
      7. Secure Firewall Configuration and Management
        1. Firewalls and Concerns
        2. What Firewalls Does?
        3. What should you not Ignore?: Firewall Limitations
        4. How Does a Firewall Work?
        5. Firewall Rules
        6. Types of Firewalls
        7. Firewall Technologies
        8. Firewall Topologies
        9. Firewall Rule Set & Policies
        10. Firewall Implementation
        11. Firewall Administration
        12. Firewall Logging and Auditing
        13. Firewall Anti-evasion Techniques
        14. Why Firewalls are Bypassed?
        15. Full Data Traffic Normalization
        16. Data Stream-based Inspection
        17. Vulnerability-based Detection and Blocking
        18. Firewall Security Recommendations and Best Practices
        19. Firewall Security Auditing Tools
      8. Secure IDS Configuration and Management
        1. Intrusions and IDPS
        2. IDS
        3. Types of IDS Alerts
        4. IPS
        5. IDPS Product Selection Considerations
        6. IDS Counterparts
      9. Secure VPN Configuration and Management
        1. Understanding Virtual Private Network (VPN)
        2. How VPN works?
        3. Why to Establish VPN ?
        4. VPN Components
        5. VPN Concentrators
        6. Types of VPN
        7. VPN Categories
        8. Selecting Appropriate VPN
        9. VPN Core Functions
        10. VPN Technologies
        11. VPN Topologies
        12. Common VPN Flaws
        13. VPN Security
        14. Quality Of Service and Performance in VPNs
      10. Wireless Network Defense
        1. Wireless Terminologies
        2. Wireless Networks
        3. Wireless Standard
        4. Wireless Topologies
        5. Typical Use of Wireless Networks
        6. Components of Wireless Network
        7. WEP (Wired Equivalent Privacy) Encryption
        8. WPA (Wi-Fi Protected Access) Encryption
        9. WPA2 Encryption
        10. WEP vs. WPA vs. WPA2
        11. Wi-Fi Authentication Method
        12. Wi-Fi Authentication Process Using a Centralized Authentication Server
        13. Wireless Network Threats
        14. Bluetooth Threats
        15. Wireless Network Security
        16. Wi-Fi Discovery Tools
        17. Locating Rogue Access points
        18. Protecting from Denial-of-Service Attacks: Interference
        19. Assessing Wireless Network Security
        20. Wi-Fi Security Auditing Tool: AirMagnet WiFi Analyzer
        21. WPA Security Assessment Tool
        22. Wi-Fi Vulnerability Scanning Tools
        23. Deploying Wireless IDS (WIDS) and Wireless IPS (WIPS)
        24. WIPS Tool
        25. Configuring Security on Wireless Routers
        26. Additional Wireless Network Security Guidelines
      11. Network Traffic Monitoring and Analysis
        1. Network Traffic Monitoring and Analysis(Introduction)
        2. Network Monitoring: Positioning your Machine at Appropriate Location
        3. Network Traffic Signatures
        4. Packet Sniffer: Wireshark
        5. Detecting OS Fingerprinting Attempts
        6. Detecting Passive OS Fingerprinting Attempts
        7. Detecting PING Sweep Attempt
        8. Detecting ARP Sweep/ ARP Scan Attempt
        9. Detecting TCP Scan Attempt
        10. Detecting SYN/FIN DDOS Attempt
        11. Detecting UDP Scan Attempt
        12. Detecting Password Cracking Attempts
        13. Detecting FTP Password Cracking Attempts
        14. Detecting Sniffing (MITM) Attempts
        15. Detecting the Mac Flooding Attempt
        16. Detecting the ARP Poisoning Attempt
        17. Additional Packet Sniffing Tools
        18. Network Monitoring and Analysis
      12. Network Risk and Vulnerability Management
        1. What is Risk?
        2. Risk Levels
        3. Risk Matrix
        4. Key Risk Indicators(KRI)
        5. Risk Management Phase
        6. Risk Identification
        7. Enterprise Network Risk Management
        8. Vulnerability Management
      13. Data Backup and Recovery
        1. Introduction to Data Backup
        2. RAID (Redundant Array Of Independent Disks) Technology
        3. Storage Area Network (SAN)
        4. Network Attached Storage (NAS)
        5. Selecting Appropriate Backup Method
        6. Choosing the Right Location for Backup
        7. Backup Types
        8. Conducting Recovery Drill Test
        9. Data Recovery
        10. Windows Data Recovery Tool
        11. RAID Data Recovery Services
        12. SAN Data Recovery Software
        13. NAS Data Recovery Services
      14. Network Incident Response and Management
        1. Incident Handling and Response
        2. Incident Response Team Members: Roles and Responsibilities
        3. First Responder
        4. Incident Handling and Response Process
        5. Overview of IH&R Process Flow
        6. Forensic Investigation
        7. Eradication and Recovery
        8. Post-incident Activities
        9. Training and Awareness

Back to Top

Next Steps after taking this EC-Council Certified Network Defender (CND) Course:

Back to Top

Do you have the right background for EC-Council Certified Network Defender (CND)?

Skills Assessment

We ensure your success by asking all students to take a FREE Skill Assessment test. These short, instructor-written tests are an objective measure of your current skills that help us determine whether or not you will be able to meet your goals by attending this course at your current skill level. If we determine that you need additional preparation or training in order to gain the most value from this course, we will recommend cost-effective solutions that you can use to get ready for the course.

Our required skill-assessments ensure that:

  1. All students in the class are at a comparable skill level, so the class can run smoothly without beginners slowing down the class for everyone else.
  2. NetCom students enjoy one of the industry's highest success rates, and pass rates when a certification exam is involved.
  3. We stay committed to providing you real value. Again, your success is paramount; we will register you only if you have the skills to succeed.
This assessment is for your benefit and best taken without any preparation or reference materials, so your skills can be objectively measured.

Take your FREE Skill Assessment test »

Back to Top

Award winning, world-class Instructors

Emilio G.
- Vastly experienced working within multinational environments and capable of connecting to different audiences - In-depth expertise in the implementation, troubleshooting and documentation of networks and security systems, with strong "hands on" technical knowledge of CISSP, CEH and CHFI. - Master of Science in Electronics Engineering, and holder of several technical certifications. - Highly-skilled in diverse fields ranging from Security, Computer Forensics, Networking, Routing Protocols, Programming, Databases and Applications to name a few. Bio: With over 25 years of technical experience, Emilio brings a dynamic set of skills supported by a Masters Degree in Electronics Engineering and on-the-field experience working in multinational environments. He also holds more than 12 Cisco, CompTIA, and Microsoft certifications. Although he is well versed and thorough in multiple technological fields, his technical forte lies in the security domain, specifically CISSP, CEH and CHFI. Emilio's skills have evolved over time, studying closely and constantly staying well informed of the growing cyber threats. These are just some of the few reasons why Emilio brings to his classes more than just what's in the books.
Larry G.
- More than 14 years of experience as a Security Subject Matter Expert as well as black belt in a variety of martial arts.
- Numerous Challenge Coins from the US Government including the US Army, and the Criminal Investigation Command.
- Much acclaimed instructor at NetCom Learning, with evaluation scores of 8.8 out of 9.

Bio:

Larry is a unique instructor and IT security expert. If you sit in one of his classes you might get the feeling of being in a martial arts class - That's exactly how Larry wants it! "The principles behind IT security are the same as those in a variety of martial arts," Larry says. In addition to teaching IT security for over 14 years, he has practiced martial arts since he was 13 years old and holds black belts in multiple disciplines including Tai Chi, Kung Fu, and Kick Boxing. "All of these techniques are like tools for different types of attacks," Larry explains.

Larry's excellence in certification training and passion for IT security has earned him numerous Challenge Coins from the US Government including the US Army, and the Criminal Investigation Command. He is also a much acclaimed instructor at NetCom Learning, with evaluation scores of 8.8 out of 9.
Richard L.
- Over 20 years experience in the IT industry.
- CEH and Microsoft training for many government agencies, including the United States Department of Homeland Security, and the Federal Bureau of Investigation.
- CEH and Microsoft training for Fortune corporations such as Merrill Lynch and ADP.

Bio:

Richard is a premier Microsoft Certified Trainer and Certified EC-Council Instructor. He has over 20 years of experience as a network administrator, security consultant, vulnerability assessor, and penetration tester for assorted Fortune companies.

Richard??s knowledge on the development and implementation of policies and procedures concerning the security of network data is unsurpassed. He has conducted successful CEH and Microsoft training classes for many government agencies including the United States Department of Homeland Security, the Department of Justice and the Federal Bureau of Investigation, as well as Fortune enterprises such as Merrill Lynch and ADP.

See more...   See more instructors...

Back to Top

Client Testimonials & Reviews about their Learning Experience

We are passionate in delivering the best learning experience for our students and they are happy to share their learning experience with us.
Read what students had to say about their experience at NetCom.   Read student testimonials...

Back to Top

Ways to contact us

Back to Top