Type
Virtual
Classroom ILT
Skill Level
Available dates
Learning Path
Virtual
Duration
1 Day
TYPE
Virtual
Classroom ILT
LEARNING PATH
SKILL LEVEL
DURATION
AVAILABLE DATES
Choose date
R18 990,00
Price excluding VAT
Introduction
Organisational focus on cyber defence is more important than ever as cyber breaches have a far greater financial impact and can cause broad reputational damage. Despite best efforts to prevent breaches, many organisations are still being compromised. Therefore, organisations must have, as part of their defence mechanisms, trained network engineers who are focused on protecting, detecting, and responding to the threats on their networks. Network administrators spend a lot of time with network environments, and are familiar with; network components; network traffic; performance and utilization; network topology; location of each system; and security policies etc.
The Certified Network Defender (CND) course is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program that prepares Network Administrators on network security technologies and operations to attain Defence-in-Depth network security skills. The course contains hands-on labs, based on major network security tools and techniques, maps to NICE 2.0 Framework and is designed with an enhanced focus of Threat Prediction, Business Continuity and Disaster Recovery which will provide Network Administrators real world expertise on current network security technologies and operations.
Audience profile
- Network Administrators
- Network Security Administrators
- Network Security Engineers
- Network Defence Technicians
- Security Analysts
- Security Operators
- Cybersecurity Engineer
- Anyone who is involved in network operations
Pre-requisites
The knowledge and skills that a learner must have before attending this course is as follows:
- Fundamental knowledge of Networking Concepts.
Course objectives
You will learn how to protect, detect and respond to network attacks. You will learn network defence fundamentals, the application of network security controls, protocols, perimeter appliances, secure IDS, VPN and firewall configuration. You will then learn the intricacies of network traffic signature, analysis and vulnerability scanning which will help you when you design greater network security policies and successful incident response plans. These skills will help you foster resiliency and continuity of operations during attacks.
Course content
Module 01: Network Attacks and Defence Strategies | |
|
|
|
|
|
|
|
|
|
|
|
|
Module 02: Administrative Network Security | |
|
|
|
|
|
|
Module 03: Technical Network Security | |
|
|
|
|
|
|
|
|
Module 04: Network Perimeter Security | |
|
|
|
|
|
|
|
|
|
|
|
Leverage Zero Trust Model Security using Software-Defined Perimeter (SDP) |
|
|
|
|
Module 05: Endpoint Security-Windows Systems | |
|
|
|
|
|
|
|
|
|
|
Module 06: Endpoint Security-Linux Systems | |
|
|
|
|
|
|
Module 07: Endpoint Security-Mobile Device | |
|
|
|
|
|
|
Module 08: Endpoint Security-IoT Devices | |
|
|
|
|
|
|
|
|
Module 09: Administrative Application Security | |
|
|
|
|
Module 10: Data Security | |
|
|
|
|
|
|
|
|
|
|
|
|
Module 11: Enterprise Virtual Network Security | |
|
|
|
|
|
|
|
|
|
|
Module 12: Enterprise Cloud Security | |
|
|
|
|
|
|
|
|
Module 13: Wireless Network Security | |
|
|
|
|
Module 14: Network Traffic Monitoring and Analysis | |
|
|
|
|
|
|
Module 15: Network Logs Monitoring and Analysis | |
|
|
|
|
|
|
|
|
Module 16: Incident Response and Forensic Investigation | |
|
|
|
|
|
|
Module 17: Business Continuity and Disaster Recovery | |
|
|
|
|
Module 18: Risk Anticipation with Risk Management | |
|
|
|
|
|
|
Module 19: Threat Assessment with Attack Surface Analysis | |
|
|
|
|
|
|
Module 20: Threat Prediction with Cyber Threat Intelligence | |
|
|
|
|
|
|
Appendices (Self-Study)
Appendix A: Computer Network Fundamentals |
|
|
|
|
|
|
|
Appendix B: Physical Network Security | |
|
|
|
|
Appendix C: Virtual Private Network (VPN) Security | |
|
|
|
|
|
|
|
Associated certifications and exam
The CND program prepares network administrators on network security technologies and operations to obtain an internationally recognized certification as a Certified Network Defender. This certification has been mapped to global job roles and has been endorsed by the US Department of Defence (DoD) as well as the National Security Agency (NSA). The exam covers the; protect, detect, respond and predict approach to network security. The course contains hands-on labs, based on major network security tools and techniques which will provide network administrators real world expertise on current network security technologies and operations. The study-kit provides you with over 10 GB of network security best practices, assessments and protection tools. The kit also contains templates for various network policies and many white papers for additional learning, which will assist you with preparing for the exam. Successful completion of the exam will earn you the title of Certified Network Defender.
Exam Details | CND Exam |
Exam Title | Certified Network Defender v2 |
Number of Questions/Practical Challenges | 100 |
Test Duration | 4 Hours |
Test Format | Interactive Multiple-Choice Questions |
Test Delivery | ECC EXAM |
Availability | ECC EXAM |
Exam Prefix | 312-38 (ECC EXAM) |
Passing Score | Cut Score 60% -85% |
On successful completion of this course students will receive a Torque IT attendance certificate.
Note:
When you attend any authorised EC Council training course at Torque IT you will receive the associated examination voucher as part of your course material. Your certification examination voucher can be used to book and pay for your certification examination at an Authorised EC Council Testing Center (ETC) only. If you are not able to sit your certification examination at Torque IT, and you have no other ETC locally available, you do have the ability to convert your examination voucher into a Pearson VUE examination voucher (Remote Procuring Services), at an additional cost.
EC-Council Overview
To beat a hacker, you need to think like one…
Ethical Hacking is the process of proactively penetrating systems, to which one has official permission to do so, with a view to determining whether vulnerabilities exist and then to undertake the necessary preventive, corrective, and protective countermeasures before an actual compromise to the systems can occur.
Torque IT’s authorised EC-Council training, and associated certification, solutions empower you to identify vulnerabilities and to assess the security posture of target systems. EC-Council certifications are universally recognised as demonstrating a high level of expertise and credibility for individuals and the organisations that employ them.
Torque IT being an EC-Council Accredited Training Center (ATC) has been the recipient of EC-Council’s most prestigious ATC of the year awards for 2016, 2014 and EC-Council’s Circle of Excellence Awards for 2015.
These achievements reflect our commitment to providing you with quality skills development, enablement, training, and certification solutions that demonstrate exceptional quality, depth and breadth.