EC-Council Certified Network Defender (CND)

- Bare 4 dager
CND Certified Network Defender EC-Council Official Training

On this accelerated 4 day Certified Network Defender course you will develop your understanding of network security technologies and operations.

We live in a digital age where cyber crime poses an ever increasing threat to individuals and businesses alike. In order to prevent costly and destructive breaches, you and your organisation must be appropriately skilled and aware of the potential threats. The CND course will teach you the critical skills necessary to protect detect and respond to cyber attacks.

Your EC-Council certified instructor will employ Firebrand’s unique Lecture | Lab | Review technique, making use of theoretical content as well as hands-on tasks on major network security tools and techniques. Made up of 50% practical work this course will provide network administrators with real-world expertise on current network security technologies and operations such as:

Les mer...

  • Network security controls, protocols and devices
  • Security policies for your organisation
  • Choosing appropriate firewall solution, topology and configurations
  • Risk and vulnerability assessment
  • First response to a network security incident

On this course you’ll be prepared to sit the Certified Network Defender (CND) 312-38 exam. You’ll sit this on-site, during the course, covered by your Certification Guarantee.

This course, which is 20% faster than traditional training, is ideal if you're a Network Administrator, Network Security Administrator, Network Security Engineer or you're involved in network operations.

9x Accredited Training Centre of the Year

Accredited Training Centre of the Year

Firebrand Training has again won the EC-Council Accredited Training Centre of the Year Award, from a Training Partner network that has more than 700 training centres across 107 countries. This extends a record-breaking run of successive awards to nine years.

Jay Bavisi, President of EC-Council said: “The annual EC-Council Awards highlights the commitment and achievements of our global partners and trainers that have contributed to the information security community.”

EC-Council's CND certification is accredited by the American National Standard Institute (ANSI). Organisations with ANSI accreditation are required to undergo stringent quality reviews and assessments. EC-Council is one of just a handful of certification bodies to achieve ANSI accreditation.

Det vil ta deg bare et øyeblikk å se hvor billige våre kurs er...

Her er 8 grunner til hvorfor du skal gjennomføre ditt CND hos Firebrand Training:

  1. Du blir utdannet og sertifisert på bare 4 dager. Hos oss får du din utdanning og sertifisering på rekordtid, en sertifisering du også gjennomfører der og da som en integrert del av den intensive, akselererte utdanningen.
  2. Alt er inkludert. Et engangsbeløp dekker alt kursmaterial, eksamen, kost og losji og tilbyr den mest kostnadseffektive måten å gjennomføre ditt CND kurs og sertifisering på. Og dette uten noen uannonserte ytterligere kostnader.
  3. Du klarer sertifiseringen første gangen eller kan gå kurset om igjen kostnadsfritt. Det er vår garanti. Vi er sikre på at du vil klare din CND sertifisering første gangen. Men skulle du mot formodning ikke gjøre det kan du innen et år komme tilbake og kun betale for eventuelle overnattinger og din eksamen. Alt annet er gratis.
  4. Du lærer deg mer.Tradisjonelle utdanningsdager varer fra kl. 09.00 til 16.00 med lange lunsj- og kaffepauser. Hos Firebrand Training får du minst 12 timers effektiv og fokusert kvalitetsutdanning hver dag sammen med din instruktør, uten private eller arbeidsrelaterte, forstyrrende momenter.
  5. Du lærer deg CND raskere. Vi kombinerer de tre innlæringsmetodene (Presentasjon |Øving| Diskusjon) slik at vi gjennomfører kurset på en måte som sikrer at du lærer deg raskere og lettere.
  6. Du er i sikre hender.Vi har utdannet og sertifisert 72.589 personer, vi er partner med alle de store navn i bransjen og vi har vunnet atskillige utmerkelser, bla. a. "Årets Learning Partner 2010, 2011, 2012, 2013 og 2015” fra Microsoft Danmark og med en vekst på 1430 % siden 2009 er vi årets Gazelle prisvinner på Sjælland, Danmark.
  7. Du lærer deg ikke bare teorien. Vi har videreutviklet CND kursen og tilbyr flere praktiske øvelser og sikrer på den måten, at du kan bruke dine ferdigheter for å løse daglige praktiske problemstillinger.
  8. Du lærer av de beste. Våre instruktører på CND er de beste i bransjen og tilbyr en helt unik blanding av kunnskap, praktisk erfaring og pasjon for å lære bort.

Er du klar for kurset? Ta en GRATIS test for å måle og vurdere kunnskapsnivået ditt.

  • Get certified 20% faster: Get trained in just 4 days compared with 5 days on other traditional courses. This means you’ll be back at work sooner, applying your new found skills.
  • EC-Council Official Curriculum: You will have access to official EC-Council curriculum, which means the content will be the most current and up-to-date.
  • EC-Council Certified Instructors: Our EC-Council instructors have years of industry-relevant knowledge, which can be used to provide valuable context to the course material.
  • Lecture | Lab | Review: This Firebrand technique employs a mixture of theoretical and practical work designed to help you retain information and develop the skills to apply your knowledge to real-world scenarios.

In preparing you to become a Certified Network Defender, the CND course will cover the following domains in Cyber defence:

Module 01: Computer Network Defense Fundamentals

  • Network Fundamentals
  • Network Components
  • TCP/IP Networking Basics
  • TCP/IP Protocol Stack
  • IP Addressing
  • Computer Network Defense (CND)
  • CND Triad
  • CND Process
  • CND Actions
  • CND Approaches

Module 02: Network Security Threats, Vulnerabilities, and Attacks

  • Essential Terminologies
  • Network Security Concerns
  • Network Security Vulnerabilities
  • Network Reconnaissance Attacks
  • Network Access Attacks
  • Denial of Service (DoS) Attacks
  • Distributed Denial-of-Service Attack (DDoS)
  • Malware Attacks

Module 03: Network Security Controls, Protocols, and Devices

  • Fundamental Elements of Network Security
  • Network Security Controls
  • User Identification, Authentication, Authorisation and Accounting
  • Types of Authorisation Systems
  • Authorisation Principles
  • Cryptography
  • Security Policy
  • Network Security Devices
  • Network Security Protocols

Module 04: Network Security Policy Design and Implementation

  • What is Security Policy?
  • Internet Access Policies
  • Acceptable-Use Policy
  • User-Account Policy
  • Remote-Access Policy
  • Information-Protection Policy
  • Firewall-Management Policy
  • Special-Access Policy
  • Network-Connection Policy
  • Business-Partner Policy
  • Email Security Policy
  • Passwords Policy
  • Physical Security Policy
  • Information System Security Policy
  • Bring Your Own Devices (BYOD) Policy
  • Software/Application Security Policy
  • Data Backup Policy
  • Confidential Data Policy
  • Data Classification Policy
  • Internet Usage Policies
  • Server Policy
  • Wireless Network Policy
  • Incidence Response Plan (IRP)
  • User Access Control Policy
  • Switch Security Policy
  • Intrusion Detection and Prevention (IDS/IPS) Policy
  • Personal Device Usage Policy
  • Encryption Policy
  • Router Policy
  • Security Policy Training and Awareness
  • ISO Information Security Standards
  • Payment Card Industry Data Security Standard (PCI-DSS)
  • Health Insurance Portability and Accountability Act (HIPAA)
  • Information Security Acts: Sarbanes Oxley Act (SOX)
  • Information Security Acts: Gramm-Leach-Bliley Act (GLBA)
  • Information Security Acts: The Digital Millennium Copyright Act (DMCA) and Federal Information Security Management Act (FISMA)
  • Other Information Security Acts and Laws

Module 05: Physical Security

  • Physical Security
  • Access Control Authentication Techniques
  • Physical Security Controls
  • Other Physical Security Measures
  • Workplace Security
  • Personnel Security: Managing Staff Hiring and Leaving Process
  • Laptop Security Tool: EXO5
  • Environmental Controls
  • Physical Security: Awareness /Training
  • Physical Security Checklists

Module 06: Host Security

  • Host Security
  • OS Security
  • Linux Security
  • Securing Network Servers
  • Hardening Routers and Switches
  • Application/software Security
  • Data Security
  • Virtualisation Security

Module 07: Secure Firewall Configuration and Management

  • Firewalls and Concerns
  • What Firewalls Does?
  • What should you not Ignore?: Firewall Limitations
  • How Does a Firewall Work?
  • Firewall Rules
  • Types of Firewalls
  • Firewall Technologies
  • Firewall Topologies
  • Firewall Rule Set & Policies
  • Firewall Implementation
  • Firewall Administration
  • Firewall Logging and Auditing
  • Firewall Anti-evasion Techniques
  • Why Firewalls are Bypassed?
  • Full Data Traffic Normalisation
  • Data Stream-based Inspection
  • Vulnerability-based Detection and Blocking
  • Firewall Security Recommendations and Best Practices
  • Firewall Security Auditing Tools

Module 08: Secure IDS Configuration and Management

  • Intrusions and IDPS
  • IDS
  • Types of IDS Implementation
  • IDS Deployment Strategies
  • Types of IDS Alerts
  • IPS
  • IDPS Product Selection Considerations
  • IDS Counterparts

Module 09: Secure VPN Configuration and Management

  • Understanding Virtual Private Network (VPN)
  • How VPN works?
  • Why to Establish VPN ?
  • VPN Components
  • VPN Concentrators
  • Types of VPN
  • VPN Categories
  • Selecting Appropriate VPN
  • VPN Core Functions
  • VPN Technologies
  • VPN Topologies
  • Common VPN Flaws
  • VPN Security
  • Quality Of Service and Performance in VPNs

Module 10: Wireless Network Defense

  • Wireless Terminologies
  • Wireless Networks
  • Wireless Standard
  • Wireless Topologies
  • Typical Use of Wireless Networks
  • Components of Wireless Network
  • WEP (Wired Equivalent Privacy) Encryption
  • WPA (Wi-Fi Protected Access) Encryption
  • WPA2 Encryption
  • WEP vs. WPA vs. WPA2
  • Wi-Fi Authentication Method
  • Wi-Fi Authentication Process Using a Centralised Authentication Server
  • Wireless Network Threats
  • Bluetooth Threats
  • Wireless Network Security
  • Wi-Fi Discovery Tools
  • Locating Rogue Access points
  • Protecting from Denial-of-Service Attacks: Interference
  • Assessing Wireless Network Security
  • Wi-Fi Security Auditing Tool: AirMagnet WiFi Analyser
  • WPA Security Assessment Tool
  • Wi-Fi Vulnerability Scanning Tools
  • Deploying Wireless IDS (WIDS) and Wireless IPS (WIPS)
  • WIPS Tool
  • Configuring Security on Wireless Routers
  • Additional Wireless Network Security Guidelines

Module 11: Network Traffic Monitoring and Analysis

  • Network Traffic Monitoring and Analysis(Introduction)
  • Network Monitoring: Positioning your Machine at Appropriate Location
  • Network Traffic Signatures
  • Packet Sniffer: Wireshark
  • Detecting OS Fingerprinting Attempts
  • Detecting PING Sweep Attempt
  • Detecting ARP Sweep/ ARP Scan Attempt
  • Detecting TCP Scan Attempt
  • Detecting SYN/FIN DDOS Attempt
  • Detecting UDP Scan Attempt
  • Detecting Password Cracking Attempts
  • Detecting FTP Password Cracking Attempts
  • Detecting Sniffing (MITM) Attempts
  • Detecting the Mac Flooding Attempt
  • Detecting the ARP Poisoning Attempt
  • Additional Packet Sniffing Tools
  • Network Monitoring and Analysis
  • Bandwidth Monitoring

Module 12: Network Risk and Vulnerability Management

  • What is Risk?
  • Risk Levels
  • Risk Matrix
  • Key Risk Indicators(KRI)
  • Risk Management Phase
  • Enterprise Network Risk Management
  • Vulnerability Management

Module 13: Data Backup and Recovery

  • Introduction to Data Backup
  • RAID (Redundant Array Of Independent Disks) Technology
  • Storage Area Network (SAN)
  • Network Attached Storage (NAS)
  • Selecting Appropriate Backup Method
  • Choosing the Right Location for Backup
  • Backup Types
  • Conducting Recovery Drill Test
  • Data Recovery
  • Windows Data Recovery Tool
  • RAID Data Recovery Services
  • SAN Data Recovery Software
  • NAS Data Recovery Services

Module 14: Network Incident Response and Management

  • Incident Handling and Response
  • Incident Response Team Members: Roles and Responsibilities
  • First Responder
  • Incident Handling and Response Process
  • Overview of IH&R Process Flow

You will sit the Certified Network Defender (CND) 312-38 exam on-site as part of the course. This is covered by your Certification Guarantee.

  • Exam Title: CND
  • Exam code: 312-38
  • Number of questions: 100
  • Duration: 4 Hours
  • Availability: ECC Exam
  • Test Format: Interactive Multiple Choice Questions

On this accelerated, all-inclusive course you'll get:

  • EC-Council CND Certified Instructor
  • Access to the official EC-Council Official Curriculum
  • Instructor-led CND exam preparation
  • EC-Council CND exam, which you'll take on the final day of the course

When you achieve your CND certification, you will be awarded a digital badge. This can be downloaded from EC-Council’s Aspen Portal.

There are currently no prerequisites for this course but having a basic understanding of Network Security will help.

EC-Council CND Kursdatoer

EC-Council - Certified Network Defender (CND)

Start

Slutt

Kapasitet

Registrer deg

26/11/2019 (Tirsdag)

29/11/2019 (Fredag)

Ferdig

 

16/3/2020 (Mandag)

19/3/2020 (Torsdag)

Ledige plasser

Registrer deg

15/6/2020 (Mandag)

18/6/2020 (Torsdag)

Ledige plasser

Registrer deg

Vi har lært opp 72.589 personer på 12 år. Vi ba dem om å anmelde vår akselererte opplæring. Akkurat nå har 96,77% angitt at Firebrand overgikk forventningene:

"Very well organised and great environment for learning."
Kevin Callahan. (26/11/2019 til 29/11/2019)

"Great Course, Great Tutor - Second time at firebrand, and the general organisation and implementation of the courses is very well put together - takes all stresses out of the course. "
M.G.. (20/5/2019 til 23/5/2019)

"Excellent learning facility, great teacher and delivery of training."
J.M.. (20/5/2019 til 23/5/2019)

"Good facilities, good instructor and good course material."
M.B., Yorkshire Water. (20/5/2019 til 23/5/2019)

"Training course was comprehensive and Dave the trainer was very good at explaining how technical processes worked relating to each topic. "
Sam Reeves, Daisy Group. (4/2/2019 til 7/2/2019)

Siste anmeldelser fra studenten vår