It Includes
- 5 Days training program
- Live Virtual Training
- Learn on any PC/Mobile/Tablet
- Unlimited Doubt Sessions
- Online Labs (if applicable)
- Official Courseware & Kits
- Get Recording after session
- Get Certificate of Completion
- Mock Tests & Exam Preps
- Classroom Training (Optional)
Training 2 or more people?
Get a custom quote for group training, Onsite & classroom options.
Request a QuoteCourse Overview
COURSE OBJECTIVE
Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and responsibilities and the Department of Defense (DoD) job roles for system/network administrators. The course is designed and developed after extensive market research and surveys.
The program prepares network administrators on network security technologies and operations to attain Defense-in-Depth network security preparedness. It covers the protect, detect and respond approach to network security. The course contains hands-on labs, based on major network security tools and techniques which will provide network administrators real world expertise on current network security technologies and operations. The study-kit provides you with over 10 GB of network security best practices, assessments and protection tools. The kit also contains templates for various network policies and a large number of white papers for additional learning.
Who Should Attend?
- Network Administrators
- Network security Administrators
- Network Security Engineer
- Network Defense Technicians
- CND Analyst
- Security Analyst
- Security Operator
- Anyone who involves in network operations
Course Outline
-
Module 01: Computer Network and Defense Fundamentals
- Network Fundamentals
- Network Components
- TCP/IP Networking Basics
- TCP/IP Protocol Stack
- Computer Network Defense (CND)
- CND Triad
- CND Process
- CND Actions
- CND Approaches
-
Module 02: Network Security Threats, Vulnerabilities, and Attacks
- Essential Terminologies
- Network Security Concerns
- Network Security Vulnerabilities
- Network Reconnaissance Attacks
- Network Access Attacks
- Denial of Service (DoS) Attacks
- Distributed Denial-of-Service Attack (DDoS)
-
Module 03: Network Security Controls, Protocols, and Devices
- Fundamental Elements of Network Security
- User Identification, Authentication, Authorization and Accounting
- Types of Authorization Systems
- Authorization Principles
- Cryptography
- Security Policy
- Network Security Devices
- Network Security Protocols
-
Module 04: Network Security Policy Design and Implementation
- What is Security Policy?
- Internet Access Policies
- Acceptable-Use Policy
- User-Account Policy
- Remote-Access Policy
- Information-Protection Policy
- Firewall-Management Policy
- Special-Access Policy
- Network-Connection Policy
- Business-Partner Policy
- Email Security Policy
- Passwords Policy
- Physical Security Policy
- Information System Security Policy
- Bring Your Own Devices (BYOD) Policy
- Software/Application Security Policy
- Data Backup Policy
- Confidential Data Policy
- Data Classification Policy
- Internet Usage Policies
- Server Policy
- Wireless Network Policy
- Incidence Response Plan (IRP)
- User Access Control Policy
- Switch Security Policy
- Intrusion Detection and Prevention (IDS/IPS) Policy
- Personal Device Usage Policy
- Encryption Policy
- Router Policy
- Security Policy Training and Awareness
- ISO Information Security Standards
-
Module 05: Physical Security
- Physical Security
- Access Control Authentication Techniques
- Physical Security Controls
- Workplace Security
- Personnel Security: Managing Staff Hiring and Leaving Process
- Laptop Security Tool: EXO5
- Physical Security: Awareness /Training
- Physical Security Checklists
-
Module 06: Host Security
- Host Security
- Linux Security
- Securing Network Servers
- Hardening Routers and Switches
- Application/software Security
- Data Security
- Virtualization Security
-
Module 07: Secure Firewall Configuration and Management
- Firewalls and Concerns
- What Firewalls Does?
- What should you not Ignore?: Firewall Limitations
- How Does a Firewall Work?
- Firewall Rules
- Types of Firewalls
- Firewall Rule Set & Policies
- Firewall Implementation
- Firewall Administration
- Firewall Logging and Auditing
- Firewall Anti-evasion Techniques
- Why Firewalls are Bypassed?
- Full Data Traffic Normalization
- Data Stream-based Inspection
- Vulnerability-based Detection and Blocking
- Firewall Security Recommendations and Best Practices
- Firewall Security Auditing Tools
-
Module 08: Secure IDS Configuration and Management
- Intrusions and IDPS
- Types of IDS Implementation
- Types of IDS Alerts
- IPS
- IDPS Product Selection Considerations
- IDS Counterparts
-
Module 09: Secure VPN Configuration and Managemen
- Understanding Virtual Private Network (VPN)
- How VPN works?
- Why to Establish VPN ?
- VPN Components
- Types of VPN
- Selecting Appropriate VPN
- VPN Core Functions
- VPN Technologies
- VPN Topologies
- Common VPN Flaws
- VPN Security
- Quality Of Service and Performance in VPNs
-
Module 10: Wireless Network Defense
- Wireless Terminologies
- Wireless Networks
- Wireless Standard
- Wireless Topologies
- Typical Use of Wireless Networks
- Components of Wireless Network
- WEP (Wired Equivalent Privacy) Encryption
- WPA (Wi-Fi Protected Access) Encryption
- WPA2 Encryption
- WEP vs. WPA vs. WPA2
- Wi-Fi Authentication Process Using a Centralized Authentication Server
- Wireless Network Threats
- Bluetooth Threats
- Wireless Network Security
- Wi-Fi Discovery Tools
- Locating Rogue Access points
- Protecting from Denial-of-Service Attacks: Interference
- Assessing Wireless Network Security
- Wi-Fi Security Auditing Tool: AirMagnet WiFi Analyzer
- WPA Security Assessment Tool
- Wi-Fi Vulnerability Scanning Tools
- Deploying Wireless IDS (WIDS) and Wireless IPS (WIPS)
- WIPS Tool
- Configuring Security on Wireless Routers
- Additional Wireless Network Security Guidelines
-
Module 11: Network Traffic Monitoring and Analysis
- Network Traffic Monitoring and Analysis(Introduction)
- Network Monitoring: Positioning your Machine at Appropriate Location
- Detecting PING Sweep Attempt
- Detecting ARP Sweep/ ARP Scan Attempt
- Detecting TCP Scan Attempt
- Detecting SYN/FIN DDOS Attempt
- Detecting UDP Scan Attempt
- Detecting Password Cracking Attempts
- Detecting FTP Password Cracking Attempts
- Detecting Sniffing (MITM) Attempts
- Detecting the Mac Flooding Attempt
- Detecting the ARP Poisoning Attempt
- Additional Packet Sniffing Tools
- Network Monitoring and Analysis
-
Module 12: Network Risk and Vulnerability Management
- What is Risk?
- Risk Levels
- Risk Matrix
- Key Risk Indicators(KRI)
- Risk Management Phase
- Enterprise Network Risk Management
- Vulnerability Management
-
Module 13: Data Backup and Recovery
- Introduction to Data Backup
- RAID (Redundant Array Of Independent Disks) Technology
- Selecting Appropriate Backup Method
- Choosing the Right Location for Backup
- Backup Types
- Conducting Recovery Drill Test
- Data Recovery
- Windows Data Recovery Tool
- RAID Data Recovery Services
- SAN Data Recovery Software
- NAS Data Recovery Services
-
Module 14: Network Incident Response and Management
- Incident Handling and Response
- Incident Response Team Members: Roles and Responsibilities
- First Responder
- Incident Handling and Response Process
- Overview of IH&R Process Flow
Vendor
Frequently Asked Questions
-
How does Live Training works?
Live training, also known as online training, is a method of delivering training in real-time over the internet. The trainer and the trainees are connected through video conferencing software, allowing for interactive communication and collaboration. During live training, the trainer can present materials, lead discussions, answer questions, and engage with the trainees in real-time. -
Does Learnfly offer Classroom & Onsite training as well?
Yes. We Do! We do offer classroom, onsite, group sessions & 1 on 1 training for selective courses. Contact our support team and our team will assist you with the process. -
Do you provide certification and exam assistance?
Yes! We provide assistance in scheduling & preparing for your exam after a successful training completion. Once you successfully pass your exam, you will be awarded with a certification. -
What if I miss my scheduled class or want to reschedule?
No worries. You can simply request for the next date as per your availability. -
Can I change the trainer if not satisfied?
We only provide highly qualified and certified trainers with 100% satisfaction rate. However, if you are not satisfied with the trainer, you can request for a free replacement. -
Do I get a lab access with the course?
Yes! If your training require a lab access, then it will be included in the price. -
Is Learnfly accredited?
Yes! Learnfly is accredited with many renowned vendors like Microsoft, ISACA, VMWare, PECB, EC Council. Cisco and many more. -
Are Learnfly Instructor's Certified?
Yes. We only provide training via Certified Instructors. -
Where is Learnfly Located?
Learnfly is a global training provider with locations in India, United States, United Kingdom, UAE, Australia & Africa. -
Does Learnfly offer after training support?
Yes. We offer 1 month free support after your training completion for any queries related to your course, examination etc. -
What is Learnfly Platform?
Learnfly Platform is an omnnichannel Learning Management System that allows you to access thousands of self paced courses, attend live classes, track certifications, access interactive quizzes & assignments, Online labs, connect with Instructors & do much more. Join the platform to know more. -
Do you offer a demo live session with an instructor?
Yes! If you need a demo session to get a feel of live training or to evaluate an instructor, then you can request for a 15 minutes free live session. Connect with our training team for more info. -
Can I get a refund if not satisfied?
All of our training comes with 30 days money back guarantee. Refunds are only applicable on instructor training. Exam, labs are non-refundable. -
How can I make a payment for my training?
We accept all major payment methods like debit/credit card, PayPal and Bank Wire transfer. For bank transfer, please contact us at support@learnfly.com -
How can i get started?
Super! Simply click on "Book Now" button on this page to reserve your seat and make a payment. You can choose from available schedules or provide your own. For anything else like quotation, purchase order, bank wire details etc, please contact our training team at support@learnfly.com. See you learning with us soon!
Certification Partners
Meet our official certification partners. Get Certified with internationally recognised names.
Earn International recognition and certification
Earn International recognition and certification
Get Certified : Get Ahead
Get your own personalized Certificate of Completion, once you successfully complete the training with Learnfly. Showcase your certifcation on Linkedin & more.
250k+ Students and growing.
Listen what they say about Learnfly Courses
I enrolled in ECIH course from Learnfly. This platform enabled me to learn difficult concepts with ease and that too at my own pace. I completed the course in a comfortable environment and would surely recommend Learnfly for this IT course that is well in demand.
Helen Thorogood,
- Student -
I enrolled in Machine Learning course from Learnfly. It was a good learning experience and I learnt the concepts well through the video lectures. The videos were well designed and helped me follow a step-by-step approach to complete my course. I recommend Learnfly for this course.
Elanie Mitchell,
- Student -
I was thrilled to pursue Artificial Intelligence course. It is in high demand. I started searching for a good online platform and luckily found Learnfly. I was initially skeptical about it but later found that it was good. My course was completed in a hassle-free manner. Kudos to Learnfly!
Ailsa Thomas,
- Student -
I pursued CEH from Learnfly. I easily understood the stuff as it was imparted in a fresh manner through well-structured video lectures. All the topics were covered in the videos and I could access them as per my requirements at different points of time. I recommend Learnfly platform to save both your time and money.
Pulkit Reddy,
- Student -
There is high demand for Artificial Intelligence course in the job market these days. I chose Learnfly to pursue this course. The video lectures were designed in a learner-friendly way and it was really convenient for me to understand the concepts well in a short span of time invested.
Raghavendran Burman,
- Student -
Machine Learning is a course that is in demand these days. I was not interested to pursue it through classroom lecture mode. I searched for few platforms offering this course online but finally opted for Learnfly. It trained me for the technology and I am now able to gain a better position in my company after learning at my own and attaining the certificate.