´╗┐

Certified Network Defender


Introduction

Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program that is based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE).

The course has also been mapped to global job roles and responsibilities and the Department of Defense (DoD) job roles for system/network administrators. The course has been designed and developed after extensive market research and surveys.The program prepares network administrators on network security technologies and operations to attain ‘Defense-in-Depth’ network security preparedness. It covers the ‘protect, detect and respond’ approach to network security.

The course contains hands-on labs, based on major network security tools and techniques which will provide network administrators real-world expertise on current network security technologies and operations. The study-kit provides you with over 10 GB of network security best practices, assessments and protection tools. The kit also contains templates for various network policies and a large number of white papers for additional learning.

Audience Profile

  • Network Administrators
  • Network security Administrators
  • Network Security Engineer
  • Network Defense Technicians
  • CND Analyst
  • Security Analyst
  • Security Operator
  • Anyone who involves in network operations

Outcomes

After completing this course, attendees will:

  • Learn about various network security controls, protocols, and devices.

  • Be able to determine the appropriate location for IDS/IPS sensors, tuning IDS for false positives and false negatives and configurations to harden security through IDPS technologies.

  • Be able to implement secure VPN implementation for their organization.

  • Learn to identify various threats to wireless networks and learn how to mitigate them.

  • Be able to monitor and conduct signature analysis to detect various types of attacks and policy violation activities.

  • Be able to perform risk assessment, vulnerability assessment/scanning through various scanning tools and generate detailed reports.

  • Be able to identify the critical data, choose appropriate backup methods, media and techniques to perform successful backups of organization data regularly.

  • Be able to provide ‘first response’ to the network security incident and assist IRT team and the forensic investigation team in dealing with an incident.

  • Be able to troubleshoot their network for various network problems.

  • Be able to identify various threats to an organization’s network.

  • Learn how to design and implement various security policies for their organization.

  • Learn the importance of physical security and be able to determine and implement various physical security controls for their organizations.

  • Be able to harden the security of various hosts individually in the organization’s network.

  • Be able to choose appropriate firewall solutions, topologies and configurations to harden security through firewalls.

Onsite training?

If you need training for three or more people, ask us about training at your site. You can enjoy the convenience of reduced travel cost and time, as well as a familiar environment for your staff. Additionally, we can customise the course for your business needs.




User Reviews

Not yet rated. You will need to follow this course before you can write a review.

Course Info


Schedule

  • Melbourne
  • 9/09/2019 - 13/09/2019

Next Step

Book Course Now
Enquire Now
Tell a Friend
Email Course Outline