EC-Council Certified Network Defender (CND)

- Kun 4 dage
CND Certified Network Defender EC-Council Official Training

On this accelerated 4 day Certified Network Defender course you will develop your understanding of network security technologies and operations.

We live in a digital age where cyber crime poses an ever increasing threat to individuals and businesses alike. In order to prevent costly and destructive breaches, you and your organisation must be appropriately skilled and aware of the potential threats. The CND course will teach you the critical skills necessary to protect detect and respond to cyber attacks.

Your EC-Council certified instructor will employ Firebrand’s unique Lecture | Lab | Review technique, making use of theoretical content as well as hands-on tasks on major network security tools and techniques. Made up of 50% practical work this course will provide network administrators with real-world expertise on current network security technologies and operations such as:

Læs mere...

  • Network security controls, protocols and devices
  • Security policies for your organisation
  • Choosing appropriate firewall solution, topology and configurations
  • Risk and vulnerability assessment
  • First response to a network security incident

On this course you’ll be prepared to sit the Certified Network Defender (CND) 312-38 exam. You’ll sit this on-site, during the course, covered by your Certification Guarantee.

This course, which is 20% faster than traditional training, is ideal if you're a Network Administrator, Network Security Administrator, Network Security Engineer or you're involved in network operations.

9x Accredited Training Centre of the Year

Accredited Training Centre of the Year

Firebrand Training has again won the EC-Council Accredited Training Centre of the Year Award, from a Training Partner network that has more than 700 training centres across 107 countries. This extends a record-breaking run of successive awards to nine years.

Jay Bavisi, President of EC-Council said: “The annual EC-Council Awards highlights the commitment and achievements of our global partners and trainers that have contributed to the information security community.”

EC-Council's CND certification is accredited by the American National Standard Institute (ANSI). Organisations with ANSI accreditation are required to undergo stringent quality reviews and assessments. EC-Council is one of just a handful of certification bodies to achieve ANSI accreditation.

Se Benefits...

Det tager kun et øjeblik at se hvor billigt dit kursus er...

Her er 4 gode grunde til at du skal tage CND hos Firebrand:

  1. Du bliver CND uddannet og certificeret hurtigere. Du lærer mere på vores 6 dages accelererede kursus og får mindst 12 timers daglig uddannelse i et distraktionsfrit miljø.
  2. Dit CND kursus er alt-inklusiv. Du får en gennemskuelig pris, der dækker alle kursusmaterialer, eksamen, overnatning og forplejning. Du skal ikke tænke på andet end at lære.
  3. Bestå CND den første gang eller kom tilbage, gratis. Din instruktør er ekspert, og træner dig ud fra accelererede metoder, så du lærer hurtigere og har de bedste muligheder for at bestå eksamen første gang. Men hvis du mod forventning ikke består, er du dækket af vores Certificeringsgaranti.
  4. Tag CND hos en prisvindende uddannelsesleverandør. Vi har vundet adskillige udmærkelser heriblandt Microsofts "Årets Learning Partner" hele fem gange og to Børsen Gazelle priser. Firebrand er din hurtigste vej til uddannelse, og vi har sparet 70,000 deltagere for mere end en million spildte timer siden 2001.

Det tager kun et øjeblik at se hvor billigt dit kursus er...

  • Get certified 20% faster: Get trained in just 4 days compared with 5 days on other traditional courses. This means you’ll be back at work sooner, applying your new found skills.
  • EC-Council Official Curriculum: You will have access to official EC-Council curriculum, which means the content will be the most current and up-to-date.
  • EC-Council Certified Instructors: Our EC-Council instructors have years of industry-relevant knowledge, which can be used to provide valuable context to the course material.
  • Lecture | Lab | Review: This Firebrand technique employs a mixture of theoretical and practical work designed to help you retain information and develop the skills to apply your knowledge to real-world scenarios.

Se Curriculum...

In preparing you to become a Certified Network Defender, the CND course will cover the following domains in Cyber defence:

Module 01: Computer Network Defense Fundamentals

  • Network Fundamentals
  • Network Components
  • TCP/IP Networking Basics
  • TCP/IP Protocol Stack
  • IP Addressing
  • Computer Network Defense (CND)
  • CND Triad
  • CND Process
  • CND Actions
  • CND Approaches

Module 02: Network Security Threats, Vulnerabilities, and Attacks

  • Essential Terminologies
  • Network Security Concerns
  • Network Security Vulnerabilities
  • Network Reconnaissance Attacks
  • Network Access Attacks
  • Denial of Service (DoS) Attacks
  • Distributed Denial-of-Service Attack (DDoS)
  • Malware Attacks

Module 03: Network Security Controls, Protocols, and Devices

  • Fundamental Elements of Network Security
  • Network Security Controls
  • User Identification, Authentication, Authorisation and Accounting
  • Types of Authorisation Systems
  • Authorisation Principles
  • Cryptography
  • Security Policy
  • Network Security Devices
  • Network Security Protocols

Module 04: Network Security Policy Design and Implementation

  • What is Security Policy?
  • Internet Access Policies
  • Acceptable-Use Policy
  • User-Account Policy
  • Remote-Access Policy
  • Information-Protection Policy
  • Firewall-Management Policy
  • Special-Access Policy
  • Network-Connection Policy
  • Business-Partner Policy
  • Email Security Policy
  • Passwords Policy
  • Physical Security Policy
  • Information System Security Policy
  • Bring Your Own Devices (BYOD) Policy
  • Software/Application Security Policy
  • Data Backup Policy
  • Confidential Data Policy
  • Data Classification Policy
  • Internet Usage Policies
  • Server Policy
  • Wireless Network Policy
  • Incidence Response Plan (IRP)
  • User Access Control Policy
  • Switch Security Policy
  • Intrusion Detection and Prevention (IDS/IPS) Policy
  • Personal Device Usage Policy
  • Encryption Policy
  • Router Policy
  • Security Policy Training and Awareness
  • ISO Information Security Standards
  • Payment Card Industry Data Security Standard (PCI-DSS)
  • Health Insurance Portability and Accountability Act (HIPAA)
  • Information Security Acts: Sarbanes Oxley Act (SOX)
  • Information Security Acts: Gramm-Leach-Bliley Act (GLBA)
  • Information Security Acts: The Digital Millennium Copyright Act (DMCA) and Federal Information Security Management Act (FISMA)
  • Other Information Security Acts and Laws

Module 05: Physical Security

  • Physical Security
  • Access Control Authentication Techniques
  • Physical Security Controls
  • Other Physical Security Measures
  • Workplace Security
  • Personnel Security: Managing Staff Hiring and Leaving Process
  • Laptop Security Tool: EXO5
  • Environmental Controls
  • Physical Security: Awareness /Training
  • Physical Security Checklists

Module 06: Host Security

  • Host Security
  • OS Security
  • Linux Security
  • Securing Network Servers
  • Hardening Routers and Switches
  • Application/software Security
  • Data Security
  • Virtualisation Security

Module 07: Secure Firewall Configuration and Management

  • Firewalls and Concerns
  • What Firewalls Does?
  • What should you not Ignore?: Firewall Limitations
  • How Does a Firewall Work?
  • Firewall Rules
  • Types of Firewalls
  • Firewall Technologies
  • Firewall Topologies
  • Firewall Rule Set & Policies
  • Firewall Implementation
  • Firewall Administration
  • Firewall Logging and Auditing
  • Firewall Anti-evasion Techniques
  • Why Firewalls are Bypassed?
  • Full Data Traffic Normalisation
  • Data Stream-based Inspection
  • Vulnerability-based Detection and Blocking
  • Firewall Security Recommendations and Best Practices
  • Firewall Security Auditing Tools

Module 08: Secure IDS Configuration and Management

  • Intrusions and IDPS
  • IDS
  • Types of IDS Implementation
  • IDS Deployment Strategies
  • Types of IDS Alerts
  • IPS
  • IDPS Product Selection Considerations
  • IDS Counterparts

Module 09: Secure VPN Configuration and Management

  • Understanding Virtual Private Network (VPN)
  • How VPN works?
  • Why to Establish VPN ?
  • VPN Components
  • VPN Concentrators
  • Types of VPN
  • VPN Categories
  • Selecting Appropriate VPN
  • VPN Core Functions
  • VPN Technologies
  • VPN Topologies
  • Common VPN Flaws
  • VPN Security
  • Quality Of Service and Performance in VPNs

Module 10: Wireless Network Defense

  • Wireless Terminologies
  • Wireless Networks
  • Wireless Standard
  • Wireless Topologies
  • Typical Use of Wireless Networks
  • Components of Wireless Network
  • WEP (Wired Equivalent Privacy) Encryption
  • WPA (Wi-Fi Protected Access) Encryption
  • WPA2 Encryption
  • WEP vs. WPA vs. WPA2
  • Wi-Fi Authentication Method
  • Wi-Fi Authentication Process Using a Centralised Authentication Server
  • Wireless Network Threats
  • Bluetooth Threats
  • Wireless Network Security
  • Wi-Fi Discovery Tools
  • Locating Rogue Access points
  • Protecting from Denial-of-Service Attacks: Interference
  • Assessing Wireless Network Security
  • Wi-Fi Security Auditing Tool: AirMagnet WiFi Analyser
  • WPA Security Assessment Tool
  • Wi-Fi Vulnerability Scanning Tools
  • Deploying Wireless IDS (WIDS) and Wireless IPS (WIPS)
  • WIPS Tool
  • Configuring Security on Wireless Routers
  • Additional Wireless Network Security Guidelines

Module 11: Network Traffic Monitoring and Analysis

  • Network Traffic Monitoring and Analysis(Introduction)
  • Network Monitoring: Positioning your Machine at Appropriate Location
  • Network Traffic Signatures
  • Packet Sniffer: Wireshark
  • Detecting OS Fingerprinting Attempts
  • Detecting PING Sweep Attempt
  • Detecting ARP Sweep/ ARP Scan Attempt
  • Detecting TCP Scan Attempt
  • Detecting SYN/FIN DDOS Attempt
  • Detecting UDP Scan Attempt
  • Detecting Password Cracking Attempts
  • Detecting FTP Password Cracking Attempts
  • Detecting Sniffing (MITM) Attempts
  • Detecting the Mac Flooding Attempt
  • Detecting the ARP Poisoning Attempt
  • Additional Packet Sniffing Tools
  • Network Monitoring and Analysis
  • Bandwidth Monitoring

Module 12: Network Risk and Vulnerability Management

  • What is Risk?
  • Risk Levels
  • Risk Matrix
  • Key Risk Indicators(KRI)
  • Risk Management Phase
  • Enterprise Network Risk Management
  • Vulnerability Management

Module 13: Data Backup and Recovery

  • Introduction to Data Backup
  • RAID (Redundant Array Of Independent Disks) Technology
  • Storage Area Network (SAN)
  • Network Attached Storage (NAS)
  • Selecting Appropriate Backup Method
  • Choosing the Right Location for Backup
  • Backup Types
  • Conducting Recovery Drill Test
  • Data Recovery
  • Windows Data Recovery Tool
  • RAID Data Recovery Services
  • SAN Data Recovery Software
  • NAS Data Recovery Services

Module 14: Network Incident Response and Management

  • Incident Handling and Response
  • Incident Response Team Members: Roles and Responsibilities
  • First Responder
  • Incident Handling and Response Process
  • Overview of IH&R Process Flow

Se Exam Track...

You will sit the Certified Network Defender (CND) 312-38 exam on-site as part of the course. This is covered by your Certification Guarantee.

  • Exam Title: CND
  • Exam code: 312-38
  • Number of questions: 100
  • Duration: 4 Hours
  • Availability: ECC Exam
  • Test Format: Interactive Multiple Choice Questions

Se What's Included...

On this accelerated, all-inclusive course you'll get:

  • EC-Council CND Certified Instructor
  • Access to the official EC-Council Official Curriculum
  • Instructor-led CND exam preparation
  • EC-Council CND exam, which you'll take on the final day of the course

When you achieve your CND certification, you will be awarded a digital badge. This can be downloaded from EC-Council’s Aspen Portal.

Det hele er inkluderet! Du får en alt-inklusiv kursuspakke, som er målrettet til dine behov. Vi tager os af enhver detalje, så det eneste du skal fokusere på er dine lærings- og certificeringsmål.

  • Transport til/fra specifikke afhentningssteder
  • Overnatninger, samtlige måltider samt adgang til forfriskninger, snacks, kaffe og the.
  • Intensiv Hands-on uddannelse med vores unikke (Lecture | Lab | Review)TM metode
  • Omfattende kursusmaterialer og labmanualer
  • Et helt igennem instruktørstyret program
  • 24 timers adgang til både undervisningslokale og instruktøren
  • Samtlige måltider samt adgang til forfriskninger, snacks, kaffe og the.
  • Certificeringsgaranti

Se Prerequisites...

There are currently no prerequisites for this course but having a basic understanding of Network Security will help.

Er du klar til dit Firebrand Kursus?

Vi interviewer alle potentielle deltagere angående deres baggrund, uddannelser, certificeringer og personlig indstilling. Hvis du kommer igennem denne screeningsprocedure, betyder det, at du har rigtig gode chancer for at bestå.

Firebrand Training tilbyder et ambitiøst uddannelsesmiljø, som forudsætter at du dedikerer dig til kurset. Ovenstående forkundskaber er vejledende; mange deltagere med mindre erfaring, men med en anden baggrund eller færdigheder, har haft succes med accelereret uddannelse hos Firebrand Training.

Hvis du funderer på hvorvidt du opfylder de anbefalede forkundskaber, er du meget velkommen til at ringe til os på 78 79 16 53 og tale med en af vores uddannelsesrådgivere, som kan hjælpe dig.

Se Hvornår...

EC-Council CND Kursusdatoer

EC-Council - Certified Network Defender (CND)

Starter

Slutter

Tilgængelighed

Tilmelding

26/11/2019 (Tirsdag)

29/11/2019 (Fredag)

Afsluttet

 

16/3/2020 (Mandag)

19/3/2020 (Torsdag)

Tilgængelige pladser

Tilmelding

15/6/2020 (Mandag)

18/6/2020 (Torsdag)

Tilgængelige pladser

Tilmelding

Vi har uddannet over 72.589 personer i løbet af 12 år. Vi har bedt dem alle om at bedømme vores accelererede kurser. Aktuelt har 96,76% sagt, at Firebrand oversteg deres forventninger:

"Great Course, Great Tutor - Second time at firebrand, and the general organisation and implementation of the courses is very well put together - takes all stresses out of the course. "
M.G.. (20/5/2019 til 23/5/2019)

"Excellent learning facility, great teacher and delivery of training."
J.M.. (20/5/2019 til 23/5/2019)

"Good facilities, good instructor and good course material."
M.B., Yorkshire Water. (20/5/2019 til 23/5/2019)

"Training course was comprehensive and Dave the trainer was very good at explaining how technical processes worked relating to each topic. "
Sam Reeves, Daisy Group. (4/2/2019 til 7/2/2019)

"Training was delivered in an intensive way. Our instructor was great at imparting knowledge on all the topics and described in detail via conversation, drawing out diagrams and expanding. This initially didnt seem to follow the course, but as we progressed it became clear much foundation knowledge was passed across in day 1 and then made the rest of the time much easier and allowed us to build on it."
L.W.. (4/2/2019 til 7/2/2019)

Seneste CND anmeldelser fra vores studerende

Er du klar til kurset? Tag en GRATIS test som hjælper dig med at bedømme din nuværende viden.