Certified Network Defender (CND) Training

The network is the front line in the cybersecurity war, and network administrators need to be ready to defend it. EC-Council’s Certified Network Defender (CND) certification gives you a solid foundation of network security and the tactical expertise to secure data and build defenses in an enterprise network.

In this network defender course, you gain a solid understanding of defensive security and hands-on capability to handle all types of network defense. Learn the tactical skills needed to design and manage a secure network while you prepare to pass the CND exam, and gain the knowledge required to ensure data security, properly configure networking technologies, and install defensive software to enhance confidentiality, integrity, and availability. Included in your course tuition is an EC-Council CND exam voucher that enables you to take the exam via ProctorU.

You Will Learn How To

  • Install, configure, and manage network security controls and devices
  • Design, implement, and monitor security policies
  • Harden hosts to secure them against intrusions
  • Implement and configure VPNs and wireless network technologies
  • Perform risk, threat, and vulnerability assessments

Recommended Experience

  • Basic network and host operations knowledge and experience commensurate with one to five years of network, host, or application administration

Course Duration

This is a 5-day class.

Exam Voucher

This course includes a voucher to take the EC-Council CND exam via ProctorU.

Exam Information

  • Upon successful completion of the third-party exam, attendees will obtain their EC-Council CND Certification
  • EC-Council Certified Network Defender (CND) Exam Code 312-38
  • Exam Questions: 100
  • Exam Duration: 4 hours
  • Passing Score: 70%
  • Taken via EC-Council Exam Portal and ProctorU

Course Outline

Network Defender Fundamentals

Classifying threats, vulnerabilities, and attacks

  • Reducing risk
  • Identifying and assessing measures

Designing and implementing security policies

  • Understanding the hierarchy of security policies
  • Enforcing and promoting policies effectively

Deploying Security Devices

Configuring wireless security

  • Choosing secure and scalable protocols
  • Testing wireless security

Monitoring and managing defenses

  • Installing patches for hardening
  • Analyzing logs

Implementing Host Security

Preventing malware infestations

  • Hardening Systems
  • Defending with antivirus and whitelists
  • Managing configuration

Evaluating baselines and monitoring

  • Patching and remediating hosts
  • Investigating types of authentication and authorization
  • Enforcing centralized access controls

Securing the Network Perimeter

Restricting access with a firewall

  • Designing the DMZ
  • Implementing deep inspection and filters

Encrypting data with a VPN

  • Selecting secure protocols
  • Authenticating encryption endpoints

Responding to Incidents

  • Monitoring traffic
  • Deploying IDS and IPS
  • Examining forensic artifacts

Please contact us for more information.

For your cybersecurity training and consulting, go with the pros at SeattlePro.