Browse Library

  • Business Solutions
  • Become an Instructor
  • 0
    Shopping Cart

    Your Cart is empty. Keep shopping to find a course!

    Browse Courses

Certified Network Defender Program

Certified Network Defender Program

Rated : 4.1 7916 views Duration :5 Days Level : Intemediate
Last Updated: 2022-07-22 05:07:29 English Delivery Format: Live Training
Live Training
$585 $90035% off
5 days left at this price!
30-Day Money-Back Guarantee

It Includes

  • 5 Days training program
  • Live Virtual Training
  • Learn on any PC/Mobile/Tablet
  • Unlimited Doubt Sessions
  • Online Labs (if applicable)
  • Official Courseware & Kits
  • Get Recording after session
  • Get Certificate of Completion
  • Mock Tests & Exam Preps
  • Classroom Training (Optional)

Training 2 or more people?

Get a custom quote for group training, Onsite & classroom options.

Request a Quote

Course Overview

COURSE OBJECTIVE

Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and responsibilities and the Department of Defense (DoD) job roles for system/network administrators. The course is designed and developed after extensive market research and surveys.
The program prepares network administrators on network security technologies and operations to attain Defense-in-Depth network security preparedness. It covers the protect, detect and respond approach to network security. The course contains hands-on labs, based on major network security tools and techniques which will provide network administrators real world expertise on current network security technologies and operations. The study-kit provides you with over 10 GB of network security best practices, assessments and protection tools. The kit also contains templates for various network policies and a large number of white papers for additional learning.

Who Should Attend?

  • Network Administrators
  • Network security Administrators
  • Network Security Engineer
  • Network Defense Technicians
  • CND Analyst
  • Security Analyst
  • Security Operator
  • Anyone who involves in network operations

Course Outline

  • Module 01: Computer Network and Defense Fundamentals

    • Network Fundamentals
    • Network Components
    • TCP/IP Networking Basics
    • TCP/IP Protocol Stack
    • Computer Network Defense (CND)
    • CND Triad
    • CND Process
    • CND Actions
    • CND Approaches

  • Module 02: Network Security Threats, Vulnerabilities, and Attacks

    • Essential Terminologies
    • Network Security Concerns
    • Network Security Vulnerabilities
    • Network Reconnaissance Attacks
    • Network Access Attacks
    • Denial of Service (DoS) Attacks
    • Distributed Denial-of-Service Attack (DDoS)

  • Module 03: Network Security Controls, Protocols, and Devices

    • Fundamental Elements of Network Security
    • User Identification, Authentication, Authorization and Accounting
    • Types of Authorization Systems
    • Authorization Principles
    • Cryptography
    • Security Policy
    • Network Security Devices
    • Network Security Protocols

  • Module 04: Network Security Policy Design and Implementation

    • What is Security Policy?
    • Internet Access Policies
    • Acceptable-Use Policy
    • User-Account Policy
    • Remote-Access Policy
    • Information-Protection Policy
    • Firewall-Management Policy
    • Special-Access Policy
    • Network-Connection Policy
    • Business-Partner Policy
    • Email Security Policy
    • Passwords Policy
    • Physical Security Policy
    • Information System Security Policy
    • Bring Your Own Devices (BYOD) Policy
    • Software/Application Security Policy
    • Data Backup Policy
    • Confidential Data Policy
    • Data Classification Policy
    • Internet Usage Policies
    • Server Policy
    • Wireless Network Policy
    • Incidence Response Plan (IRP)
    • User Access Control Policy
    • Switch Security Policy
    • Intrusion Detection and Prevention (IDS/IPS) Policy
    • Personal Device Usage Policy
    • Encryption Policy
    • Router Policy
    • Security Policy Training and Awareness
    • ISO Information Security Standards

  • Module 05: Physical Security

    • Physical Security
    • Access Control Authentication Techniques
    • Physical Security Controls
    • Workplace Security
    • Personnel Security: Managing Staff Hiring and Leaving Process
    • Laptop Security Tool: EXO5
    • Physical Security: Awareness /Training
    • Physical Security Checklists

  • Module 06: Host Security

    • Host Security
    • Linux Security
    • Securing Network Servers
    • Hardening Routers and Switches
    • Application/software Security
    • Data Security
    • Virtualization Security

  • Module 07: Secure Firewall Configuration and Management

    • Firewalls and Concerns
    • What Firewalls Does?
    • What should you not Ignore?: Firewall Limitations
    • How Does a Firewall Work?
    • Firewall Rules
    • Types of Firewalls
    • Firewall Rule Set & Policies
    • Firewall Implementation
    • Firewall Administration
    • Firewall Logging and Auditing
    • Firewall Anti-evasion Techniques
    • Why Firewalls are Bypassed?
    • Full Data Traffic Normalization
    • Data Stream-based Inspection
    • Vulnerability-based Detection and Blocking
    • Firewall Security Recommendations and Best Practices
    • Firewall Security Auditing Tools

  • Module 08: Secure IDS Configuration and Management

    • Intrusions and IDPS
    • Types of IDS Implementation
    • Types of IDS Alerts
    • IPS
    • IDPS Product Selection Considerations
    • IDS Counterparts

  • Module 09: Secure VPN Configuration and Managemen

    • Understanding Virtual Private Network (VPN)
    • How VPN works?
    • Why to Establish VPN ?
    • VPN Components
    • Types of VPN
    • Selecting Appropriate VPN
    • VPN Core Functions
    • VPN Technologies
    • VPN Topologies
    • Common VPN Flaws
    • VPN Security
    • Quality Of Service and Performance in VPNs

  • Module 10: Wireless Network Defense

    • Wireless Terminologies
    • Wireless Networks
    • Wireless Standard
    • Wireless Topologies
    • Typical Use of Wireless Networks
    • Components of Wireless Network
    • WEP (Wired Equivalent Privacy) Encryption
    • WPA (Wi-Fi Protected Access) Encryption
    • WPA2 Encryption
    • WEP vs. WPA vs. WPA2
    • Wi-Fi Authentication Process Using a Centralized Authentication Server
    • Wireless Network Threats
    • Bluetooth Threats
    • Wireless Network Security
    • Wi-Fi Discovery Tools
    • Locating Rogue Access points
    • Protecting from Denial-of-Service Attacks: Interference
    • Assessing Wireless Network Security
    • Wi-Fi Security Auditing Tool: AirMagnet WiFi Analyzer
    • WPA Security Assessment Tool
    • Wi-Fi Vulnerability Scanning Tools
    • Deploying Wireless IDS (WIDS) and Wireless IPS (WIPS)
    • WIPS Tool
    • Configuring Security on Wireless Routers
    • Additional Wireless Network Security Guidelines

  • Module 11: Network Traffic Monitoring and Analysis

    • Network Traffic Monitoring and Analysis(Introduction)
    • Network Monitoring: Positioning your Machine at Appropriate Location
    • Detecting PING Sweep Attempt
    • Detecting ARP Sweep/ ARP Scan Attempt
    • Detecting TCP Scan Attempt
    • Detecting SYN/FIN DDOS Attempt
    • Detecting UDP Scan Attempt
    • Detecting Password Cracking Attempts
    • Detecting FTP Password Cracking Attempts
    • Detecting Sniffing (MITM) Attempts
    • Detecting the Mac Flooding Attempt
    • Detecting the ARP Poisoning Attempt
    • Additional Packet Sniffing Tools
    • Network Monitoring and Analysis

  • Module 12: Network Risk and Vulnerability Management

    • What is Risk?
    • Risk Levels
    • Risk Matrix
    • Key Risk Indicators(KRI)
    • Risk Management Phase
    • Enterprise Network Risk Management
    • Vulnerability Management

  • Module 13: Data Backup and Recovery

    • Introduction to Data Backup
    • RAID (Redundant Array Of Independent Disks) Technology
    • Selecting Appropriate Backup Method
    • Choosing the Right Location for Backup
    • Backup Types
    • Conducting Recovery Drill Test
    • Data Recovery
    • Windows Data Recovery Tool
    • RAID Data Recovery Services
    • SAN Data Recovery Software
    • NAS Data Recovery Services

  • Module 14: Network Incident Response and Management

    • Incident Handling and Response
    • Incident Response Team Members: Roles and Responsibilities
    • First Responder
    • Incident Handling and Response Process
    • Overview of IH&R Process Flow

Learnfly is a leading online e-learning marketplace, which has been assisting individuals & Corporate employees to learn new skills to achieve personal and professional goals. Having global instructor base with over hundreds of courses, our e-learning marketplace aims to reinforce the professional efficiency of individuals through online e-learning courses that are strategically designed to revolutionize your presence in the industry.
View More...

Frequently Asked Questions

  • How does Live Training works?

    Live training, also known as online training, is a method of delivering training in real-time over the internet. The trainer and the trainees are connected through video conferencing software, allowing for interactive communication and collaboration. During live training, the trainer can present materials, lead discussions, answer questions, and engage with the trainees in real-time.
  • Does Learnfly offer Classroom & Onsite training as well?

    Yes. We Do! We do offer classroom, onsite, group sessions & 1 on 1 training for selective courses. Contact our support team and our team will assist you with the process.
  • Do you provide certification and exam assistance?

    Yes! We provide assistance in scheduling & preparing for your exam after a successful training completion. Once you successfully pass your exam, you will be awarded with a certification.
  • What if I miss my scheduled class or want to reschedule?

    No worries. You can simply request for the next date as per your availability.
  • Can I change the trainer if not satisfied?

    We only provide highly qualified and certified trainers with 100% satisfaction rate. However, if you are not satisfied with the trainer, you can request for a free replacement.
  • Do I get a lab access with the course?

    Yes! If your training require a lab access, then it will be included in the price.
  • Is Learnfly accredited?

    Yes! Learnfly is accredited with many renowned vendors like Microsoft, ISACA, VMWare, PECB, EC Council. Cisco and many more.
  • Are Learnfly Instructor's Certified?

    Yes. We only provide training via Certified Instructors.
  • Where is Learnfly Located?

    Learnfly is a global training provider with locations in India, United States, United Kingdom, UAE, Australia & Africa.
  • Does Learnfly offer after training support?

    Yes. We offer 1 month free support after your training completion for any queries related to your course, examination etc.
  • What is Learnfly Platform?

    Learnfly Platform is an omnnichannel Learning Management System that allows you to access thousands of self paced courses, attend live classes, track certifications, access interactive quizzes & assignments, Online labs, connect with Instructors & do much more. Join the platform to know more.
  • Do you offer a demo live session with an instructor?

    Yes! If you need a demo session to get a feel of live training or to evaluate an instructor, then you can request for a 15 minutes free live session. Connect with our training team for more info.
  • Can I get a refund if not satisfied?

    All of our training comes with 30 days money back guarantee. Refunds are only applicable on instructor training. Exam, labs are non-refundable.
  • How can I make a payment for my training?

    We accept all major payment methods like debit/credit card, PayPal and Bank Wire transfer. For bank transfer, please contact us at support@learnfly.com
  • How can i get started?

    Super! Simply click on "Book Now" button on this page to reserve your seat and make a payment. You can choose from available schedules or provide your own. For anything else like quotation, purchase order, bank wire details etc, please contact our training team at support@learnfly.com. See you learning with us soon!
How it Works?
01
Choose your live class topic
Browse from 250+ live class sessions and topics on Learnfly platform. Learn from the comfort of your home or office.
02
Book and Schedule your class
Book online & reserve your seat for the live class. You can select from available schedule or provide your preferred dates and time during signup process.
03
Make online payment
Make payment for the live class with debit/credit card or paypal. Pay in your preferred currency & with easy EMI* option. EMI option is available in selected countries.
04
Check for Confirmation
Once you make successful payment, your live class will be confirmed and details will be available on your dashboard. We will also send you an email with confirmation with other details.

Certification Partners

Meet our official certification partners. Get Certified with internationally recognised names.

Earn International recognition and certification

Earn International recognition and certification

Get Certified : Get Ahead

Get your own personalized Certificate of Completion, once you successfully complete the training with Learnfly. Showcase your certifcation on Linkedin & more.

250k+ Students and growing.

Listen what they say about Learnfly Courses

More in Tech & IT

$900
Enquire Now

Students learning on Learnfly works with Fortune 500 companies around the globe.

Sign Up & Start Learning
By signing up, you agree to our Terms of Use and Privacy Policy
Reset Password
Enter your email address and we'll send you a link to reset your password.