CND: Certified Network Defender

Overview

Duration: 5 days
CPE Credits: 35
Course Number: SEC-321
CND - Certified Network Defender

This CND training seminar is a five day, 35 CPE course offered to you by Intrinsec Security – an Accredited Training Center in partnership with EC-Council.

CND Training Information

Certified Network Defender (CND) is a vendor-neutral, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive course based on a job-task analysis and cybersecurity education framework presented by the National Initiative for Cybersecurity Education (NICE). This official EC-Counsel course has also been mapped to global job roles and responsibilities and the Department of Defense (DoD) job roles for system/network administrators.

The training exercises and class material prepares students on network security technologies and operations to attain Defense-in-Depth network security preparedness. It covers the protect, detect and respond approach to network security. CND contains hands-on labs, based on network security tools and techniques which provide real expertise on current network security technologies and operations.

Aside from a reserved seat in an upcoming CND training seminar, the resources provided with registration include official EC-Council courseware along with a CND exam voucher. Not only that, but you will also gain access to a number of EC-Council’s self-paced resources including their online lab environment (iLabs). When you combine the instructor-led training with the course resources, this official EC-Council training program is a great tool for those interested in gaining either network defense skills, the CND certification, or both.

What Comes With This Course

  • Five Days of Official EC-Council Training from an Authorized CND Instructor
  • Official EC-Council CND Courseware
  • Official EC-Council CND Lab Manual
  • Official EC-Council CND Tools
  • Six Months of Online Access to iLabs for CND (virtual exercises)
  • Test Prep Program
  • Exam Voucher for CND

ALL OF THE RESOURCES YOU NEED TO BECOME CND CERTIFIED

COURSEWARE AND MANUALS
iLabs, VIRTUAL EXERCISES
PRACTICE TESTS
EXAM VOUCHER

What You Will Learn

This official CND training seminar is based on the 14 domains featured in the CND certification program, ensuring you successfully prepare for the CND exam while also enhancing your overall competencies in network defense.

Module 1: Computer Network and Defense Fundamentals

Computer Network and Defense Fundamentals

The first module in Certified Network Defender that students review is Computer Network and Defense Fundamentals. The main areas of focus in module 1 are network security controls, protocols, and devices.
 

CND Lessons in Module 1
  • Network Fundamentals
  • Network Components
  • TCP/IP Networking Basics
  • TCP/IP Protocol Stack
  • IP Addressing
  • Computer Network Defense (CND)
  • CND Triad
  • CND Process
  • CND Actions
  • CND Approaches
Module 2: Network Security Threats, Vulnerabilities, and Attacks

Network Security Threats, Vulnerabilities, and Attacks

Module 2 of CND analyzes how to troubleshoot a network for various network problems.
 

CND Lessons in Module 2
  • Essential Terminologies
  • Network Security Concerns
  • Network Security Vulnerabilities
  • Network Reconnaissance Attacks
  • Network Access Attacks
  • Denial of Service (DoS) Attacks
  • Distributed Denial-of-Service Attack (DDoS)
  • Malware Attacks
Module 3: Network Security Controls, Protocol, and Devices

Network Security Controls, Protocol, and Devices

The third module in Certified Network Defender is called, “Network Security Controls, Protocol, and Devices” It teaches students how to identify various threats on an organizational network.
 

CND Lessons in Module 3
  • Fundamental Elements of Network Security
  • Network Security Controls
  • User Identification, Authentication, Authorization, and Accounting
  • Types of Authorization Systems
  • Authorization Principles
  • Cryptography
  • Security Policy
  • Network Security Devices
  • Network Security Protocols
Module 4: Network Security Policy Design and Implementation

Network Security Policy Design and Implementation

Module 4 of this course reviews how to design and implement various security policies for their organization.
 

CND Lessons in Module 4
  • What is Security Policy?
  • Internet Access Policies
  • Acceptable-Use Policy
  • User-Account Policy
  • Remote Access Policy
  • Information-Protection Policy
  • Firewall-Management Policy
  • Special-Access Policy
  • Network Connection Policy
  • Business-Partner Policy
  • Email Security Policy
  • Passwords Policy
  • Physical Security Policy
  • Information System Security Policy
  • Bring Your Own Devices (BYOD) Policy
  • Software/Application Security Policy
  • Data Backup Policy
  • Confidential Data Policy
  • Data Classification Policy
  • Internet Usage Policies
  • Server Policy
  • Wireless Network Policy
  • Incident Response Plan (IRP)
  • User Access Control Policy
  • Switch Security Policy
  • Intrusion Detection and Prevention (IDS/IPS) Policy
  • Personal Device Usage Policy
  • Encryption Policy
  • Router Policy
  • Security Policy Training and Awareness
  • ISO Information Security Standards
  • Payment Card Industry Data Security Standard (PCI-DSS)
  • Health Insurance Portability and Accountability Act (HIPAA)
  • Information Security Acts: Sarbanes-Oxley Act (SOX)
  • Information Security Acts: Gramm-Leach-Bliley Act (GLBA)
  • Information Security Acts: The Digital Millennium Copyright Act (DMCA) and Federal Information Security Management Act (FISMA)
  • Other Information Security Acts and Laws
Module 5: Physical Security

Physical Security

Module 5 of Certified Network Defender reviews the importance of physical security, while also covering how to determine and implement various physical security controls for an organization.
 

CND Lessons in Module 5
  • Physical Security
  • Access Control Authentication Techniques
  • Physical Security Controls
  • Other Physical Security Measures
  • Workplace Security
  • Personnel Security: Managing Staff Hiring and Leaving Process
  • Laptop Security Tool: EXO5
  • Environmental Controls
  • Physical Security: Awareness / Training
  • Physical Security Checklists
Module 6: Host Security

Host Security

Host Security is the sixth module featured in Certified Network Defender, and in this training program, it reviews how to harden the security of various hosts individually in the organization’s network.
 

CND Lessons in Module 6
  • Host Security
  • OS Security
  • Linux Security
  • Securing Network Servers
  • Hardening Routers and Switches
  • Application / Software Security
  • Data Security
  • Virtualization Security
Module 7: Secure Firewall Configuration and Management

Secure Firewall Configuration and Management

Module 7 of Certified Network Defender focuses on how to choose the appropriate firewall solution, topology, and configurations to harden security through firewalls.
 

CND Lessons in Module 7
  • Firewalls and Concerns
  • What Firewalls Does?
  • What should you not Ignore? Firewall Limitations
  • How does a Firewall Work?
  • Firewall Rules
  • Types of Firewalls
  • Firewall Technologies
  • Firewall Topologies
  • Firewall Rule Set & Policies
  • Firewall Implementation
  • Firewall Administration
  • Firewall Logging and Auditing
  • Firewall Anti-Evasion Techniques
  • Why are Firewalls Bypassed?
  • Full Data Traffic Normalization
  • Data Steam-based Inspection
  • Vulnerability-based Detection and Blocking
  • Firewall Security Recommendations and Best Practices
  • Firewall Security Auditing Tools
Module 8: Secure IDS Configuration and Management

Secure IDS Configuration and Management

Module 8 of this course reviews how to determine an appropriate location for IDS/IPS sensors, turning IDS for false positives and false negatives, and configurations to harden security through IDPS technologies.
 

CND Lessons in Module 8
  • Intrusions and IDPS
  • IDS
  • Types of IDS Implementation
  • IDS Deployment Strategies
  • Types of IDS Alerts
  • IPS
  • IDPS Product Selection Considerations
  • IDS Counterparts
Module 9: Secure VPN Configuration and Management

Secure VPN Configuration and Management

Secure VPN Configuration and Management is the ninth module featured in this official CND training seminar. Students review how to implement secure VPN implementation for their organization.
 

CND Lessons in Module 9
  • Understanding Virtual Private Network (VPN)
  • How VPN Works?
  • Why Establish VPN?
  • VPN Components
  • VPN Concentrators
  • Types of VPN
  • VPN Categories
  • Selecting Appropriate VPN
  • VPN Core Functions
  • VPN Technologies
  • VPN Topologies
  • Common CPN Flaws
  • VPN Security
  • Quality of Service and Performance in VPNs
  • SLAs for VPN
  • IP VPN Service Level Management
  • VPN Service Provides
  • Auditing and Testing the VPN
  • Best Security Practices for VPN Configuration
Module 10: Wireless Network Defense

Wireless Network Defense

Wireless Network Defense is the tenth module focused on in Certified Network Defender. It reviews how to identify various threats in a wireless network, while also covering how to mitigate them.
 

CND Lessons in Module 10
  • Wireless Terminologies
  • Wireless Networks
  • Wireless Standard
  • Wireless Topologies
  • Typical Use of Wireless Networks
  • Components of Wireless Networks
  • Components of Wireless Network
  • WEP (Wired Equivalent Privacy) Encryption
  • WPA (Wi-Fi Protected Access) Encryption
  • WPA2 Encryption
  • WEP vs. WPA vs. WPA2
  • Wi-Fi Authentication Method
  • Wi-Fi Authentication Process Using a Centralized Authentication Server
  • Wireless Network Threats
  • Bluetooth Threats
  • Wireless Network Security
  • Wi-Fi Discovery Tools
  • Locating Rogue Access Points
  • Protecting from Denial-of-Service Attacks: Interference
  • Assessing Wireless Network Security
  • Wi-Fi Security Auditing Tool” AirMagnet WiFi Analyzer
  • WPA Security Assessment Tool
  • Wi-Fi Vulnerability Scanning Tools
  • Deploying Wireless IDS (WIDS) and Wireless IPS (WIPS)
  • WIPS Tool
  • Configuring Security on Wireless Routers
  • Additional Wireless Network Security Guidelines
Module 11: Network Traffic Monitoring and Analysis

Network Traffic Monitoring and Analysis

Module 11 in this official Certified Network Defender course reviews how students can monitor and conduct signature analysis to detect various types of attacks and policy violation activities.
 

CND Lessons in Module 11
  • Network Traffic Monitoring and Analysis Overview
  • Network Monitoring: Positioning your Machine at Appropriate Location
  • Network Traffic Signatures
  • Packet Sniffer: Wireshark
  • Detecting OS Fingerprinting Attempts
  • Detecting PING Sweep Attempt
  • Detecting ARP Sweep / ARP Scan Attempt
  • Detecting TCP Scan Attempt
  • Detecting SYN/FIN DDOS Attempt
  • Detecting UDP Scan Attempt
  • Detecting Password Cracking Attempts
  • Detecting FTP Password Cracking Attempts
  • Detecting Sniffing (MITM) Attempts
  • Detecting the Mac Flooding Attempt
  • Detecting the ARP Poisoning Attempt
  • Additional Packet Sniffing Tools
  • Network Monitoring and Analysis
  • Bandwidth Monitoring
Module 12: Responding to and Recovering from Incidents

Network Risk and Vulnerability Management

This module reviews how to perform risk assessment, vulnerability assessment/scanning through various scanning tools and general detailed reports on it.
 

CND Lessons in Module 12
  • What is Risk?
  • Risk Levels
  • Risk Matrix
  • Key Risk Indicators (KRI)
  • Risk Management Phase
  • Enterprise Network Risk Management
  • Vulnerability Management
Module 13: Data Backup and Recovery

Data Backup and Recovery

In Data Backup and Recovery, students review how to identify the critical data, choose an appropriate backup method, media, and technique to perform a successful backup of organization data on regular basis.
 

CND Lessons in Module 13
  • Introduction to Data Backup
  • RAID (Redundant Array of Independent Disks) Technology
  • Storage Area Networks (SAN)
  • Network Attached Storage (NAS)
  • Selecting Appropriate Backup Method
  • Choosing the Right Location for Backup
  • Backup Types
  • Conducting Recovery Drill Test
  • Data Recovery
  • Windows Data Recovery Tool
  • RAID Data Recovery Services
  • SAN Data Recovery Software
  • NAS Data Recovery Services
Module 14: Network Incident Response and Management

Network Incident Response and Management

Module 14 of Certified Network Defender reviews how students can provide first response to the network security incident and assist IRT team and forensics investigation team in dealing with an incident.
 

CND Lessons in Module 14
  • Incident Handling and Response
  • Incident Response Team Members: Roles and Responsibilities
  • First Responder
  • Incident Handling and Response Process
  • Overview of IH&R Process Flow

This CND Training Program Is Brought To You By:

 

VIEW UPCOMING CLASS DATES

Two Things You Should Know About Intrinsec

WE’LL PAY YOU TO BECOME CND CERTIFIED

With the YOU PASS WE PAY promo, you’re eligible to receive $300 if you pass the CND exam within 90 days of completing this course!

TELL ME MORE
*See terms & conditions for details.

FIND A LOWER PRICE AND WE’LL MATCH IT

Our PRICE MATCH GUARANTEE is simple – not only do you get the most effective training available, but you also pay the best price!

TELL ME MORE
 

Why Yes, We Do Provide Group Training!

We have multiple options for you to lower costs and get more of your people trained.

Schedule

DateTimeLocationPriceRegister
Nov 27 - Dec 1, 2017

***BACKORDER (FULL CLASS)

8:00am - 4:00pm MST Live Online USD $3,345.00
 

Request Group Training