Ideal Candidates for CND - Certified Network Defender Class
System administratorsSystem engineersFirewall administratorsNetwork managersIT managersIT professionalsAnyone interested in network security technologiesManagers who want to understand cyber security core principles and practicesOperations personnel, who although do not have security as their primary job function, will need an understanding of cyber security core principles and practices
CND - Certified Network Defender Prerequisites
You should be well-versed in cyber security fundamentals.
What You'll Get in CND - Certified Network Defender
What You'll Learn in CND - Certified Network Defender
Students enrolled in the Certified Network Defender course, will gain a detailed understanding and hands on ability to function in real life situations involving network defense. They will gain the technical depth required to actively design a secure network in your organization. This program will be akin to learning math instead of just using a calculator. This course gives you the fundamental understanding of the true construct of data transfer, network technologies, software technologies so that you understand how networks operate, understand what software is automating and how to analyze the subject material.You will learn how to protect, detect and respond to the network attacks. You will learn network defense fundamentals, the application of network security controls, protocols, perimeter appliances, secure IDS, VPN and firewall configuration. You will then learn the intricacies of network traffic signature, analysis and vulnerability scanning which will help you when you design greater network security policies and successful incident response plans. These skills will help you foster resiliency and continuity of operations during attacks.
CND - Certified Network Defender Certification
CND credential
Exam Prefix: 312-38 (ECC EXAM)
CND - Certified Network Defender Outline
1. Computer Network Defense Fundamentals
2. Network Security Threats, Vulnerabilities, and Attacks
3. Network Security Controls, Protocols, and Perimeter Appliances
4. Secure Firewall Configuration, Deployment and Management
5. Secure IDS Configuration and Management
6. Secure VPN Configuration and Management
7. Designing a Secure Network
8. Network Traffic Signatures and Analysis
9. Monitoring and Securing Network Traffic
10. Network Vulnerability Scanning
11. Host/System Security
12. Physical Security
13. Designing and Implementation of Network Security Policies
14. Network Incident Response and Management
15. Network Backup and Disaster Recovery
16. Wireless Network Defense
Testimonials
A. Erlich
RITSC, N6CI just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.