EC-Council Certified Network Defender (CND)

- Bara 4 dagar
CND Certified Network Defender EC-Council Official Training

On this accelerated 4 day Certified Network Defender course you will develop your understanding of network security technologies and operations.

We live in a digital age where cyber crime poses an ever increasing threat to individuals and businesses alike. In order to prevent costly and destructive breaches, you and your organisation must be appropriately skilled and aware of the potential threats. The CND course will teach you the critical skills necessary to protect detect and respond to cyber attacks.

Your EC-Council certified instructor will employ Firebrand’s unique Lecture | Lab | Review technique, making use of theoretical content as well as hands-on tasks on major network security tools and techniques. Made up of 50% practical work this course will provide network administrators with real-world expertise on current network security technologies and operations such as:

Läs mer...

  • Network security controls, protocols and devices
  • Security policies for your organisation
  • Choosing appropriate firewall solution, topology and configurations
  • Risk and vulnerability assessment
  • First response to a network security incident

On this course you’ll be prepared to sit the Certified Network Defender (CND) 312-38 exam. You’ll sit this on-site, during the course, covered by your Certification Guarantee.

This course, which is 20% faster than traditional training, is ideal if you're a Network Administrator, Network Security Administrator, Network Security Engineer or you're involved in network operations.

9x Accredited Training Centre of the Year

Accredited Training Centre of the Year

Firebrand Training has again won the EC-Council Accredited Training Centre of the Year Award, from a Training Partner network that has more than 700 training centres across 107 countries. This extends a record-breaking run of successive awards to nine years.

Jay Bavisi, President of EC-Council said: “The annual EC-Council Awards highlights the commitment and achievements of our global partners and trainers that have contributed to the information security community.”

EC-Council's CND certification is accredited by the American National Standard Institute (ANSI). Organisations with ANSI accreditation are required to undergo stringent quality reviews and assessments. EC-Council is one of just a handful of certification bodies to achieve ANSI accreditation.

Se Benefits...

Det tar bara ett ögonblick att se hur billig din kurs är...

Här är 8 skäl varför du ska genomföra din CND hos Firebrand Training:

  1. Du blir utbildad och certifierad på bara 4 dagar. Hos oss får du din utbildning och certifiering på rekordtid, en certifering du också genomför här på plats som en integrerad del av den intensiva, accelererade utbildningen.
  2. Allt är inkluderat. Ett engångsbelopp täcker alla kursmaterial, examen, boende och mat och erbjuder det mest kostnadseffektiva sättet att erhålla din CND kurs och certifiering på. Och detta utan några oannonserade ytterligare kostnader.
  3. Du klarar CND certifieringen första gången eller kan gå om kursen kostnadsfritt. Det är vår garanti. Vi är säkra på att du kommer klara din certifiering första gången. Men skulle du mot förmodan inte göra det kan du inom ett år komma tillbaks, delta i hela kursen igen, och bara betala för eventuella övernattningar och din examen. Allt annat är gratis.
  4. Du lär dig mer.Traditionella utbildningsdagar pågår kl. 09.00-16.00 med långa lunch- och fikapauser. Hos Firebrand Training får du minst 12 timmars effektiv och fokuserad kvalitetsutbildning varje dag tillsammans med din instruktör, utan vare sig privata eller arbetsrelaterade störande moment.
  5. Du lär dig CND snabbare. Vi kombinerar de tre inlärningsmetoderna (Presentation|Övning|Diskussion) så att vi därigenom genomför kursen på ett sätt som säkerställer att du lär dig snabbare och lättare.
  6. Du är i säkra händer.Vi har utbildat och certifierat 72.589 personer, vi är auktoriserad partner med alla de stora namnen i branschen och har dessutom vunnit åtskilliga utmärkelser med bland annat ”Årets Learning Partner 2010, 2011, 2012, 2013 och 2015” från Microsoft Danmark och Gazelle priset 2013 - 1. plats för region Själland i Danmark med en tillväxt om 1.430% sedan 2009.
  7. Du lär dig inte bara teorin. Vi har vidareutvecklat CNDkursen med fler praktiska övningar som ger dig det extra du behöver för att kunna lösa praktiska problemställningar och klara din certifiering.
  8. Du lär dig från de bästa. Våra instruktörer är de bästa i branschen och erbjuder en helt unik blandning av kunskap, praktisk erfarenhet och passion för att lära ut.

Är du redo för kursen? Ta ett KOSTNADSFRITT test för att mäta och utvärdera din kunskap.

  • Get certified 20% faster: Get trained in just 4 days compared with 5 days on other traditional courses. This means you’ll be back at work sooner, applying your new found skills.
  • EC-Council Official Curriculum: You will have access to official EC-Council curriculum, which means the content will be the most current and up-to-date.
  • EC-Council Certified Instructors: Our EC-Council instructors have years of industry-relevant knowledge, which can be used to provide valuable context to the course material.
  • Lecture | Lab | Review: This Firebrand technique employs a mixture of theoretical and practical work designed to help you retain information and develop the skills to apply your knowledge to real-world scenarios.

Se Curriculum...

In preparing you to become a Certified Network Defender, the CND course will cover the following domains in Cyber defence:

Module 01: Computer Network Defense Fundamentals

  • Network Fundamentals
  • Network Components
  • TCP/IP Networking Basics
  • TCP/IP Protocol Stack
  • IP Addressing
  • Computer Network Defense (CND)
  • CND Triad
  • CND Process
  • CND Actions
  • CND Approaches

Module 02: Network Security Threats, Vulnerabilities, and Attacks

  • Essential Terminologies
  • Network Security Concerns
  • Network Security Vulnerabilities
  • Network Reconnaissance Attacks
  • Network Access Attacks
  • Denial of Service (DoS) Attacks
  • Distributed Denial-of-Service Attack (DDoS)
  • Malware Attacks

Module 03: Network Security Controls, Protocols, and Devices

  • Fundamental Elements of Network Security
  • Network Security Controls
  • User Identification, Authentication, Authorisation and Accounting
  • Types of Authorisation Systems
  • Authorisation Principles
  • Cryptography
  • Security Policy
  • Network Security Devices
  • Network Security Protocols

Module 04: Network Security Policy Design and Implementation

  • What is Security Policy?
  • Internet Access Policies
  • Acceptable-Use Policy
  • User-Account Policy
  • Remote-Access Policy
  • Information-Protection Policy
  • Firewall-Management Policy
  • Special-Access Policy
  • Network-Connection Policy
  • Business-Partner Policy
  • Email Security Policy
  • Passwords Policy
  • Physical Security Policy
  • Information System Security Policy
  • Bring Your Own Devices (BYOD) Policy
  • Software/Application Security Policy
  • Data Backup Policy
  • Confidential Data Policy
  • Data Classification Policy
  • Internet Usage Policies
  • Server Policy
  • Wireless Network Policy
  • Incidence Response Plan (IRP)
  • User Access Control Policy
  • Switch Security Policy
  • Intrusion Detection and Prevention (IDS/IPS) Policy
  • Personal Device Usage Policy
  • Encryption Policy
  • Router Policy
  • Security Policy Training and Awareness
  • ISO Information Security Standards
  • Payment Card Industry Data Security Standard (PCI-DSS)
  • Health Insurance Portability and Accountability Act (HIPAA)
  • Information Security Acts: Sarbanes Oxley Act (SOX)
  • Information Security Acts: Gramm-Leach-Bliley Act (GLBA)
  • Information Security Acts: The Digital Millennium Copyright Act (DMCA) and Federal Information Security Management Act (FISMA)
  • Other Information Security Acts and Laws

Module 05: Physical Security

  • Physical Security
  • Access Control Authentication Techniques
  • Physical Security Controls
  • Other Physical Security Measures
  • Workplace Security
  • Personnel Security: Managing Staff Hiring and Leaving Process
  • Laptop Security Tool: EXO5
  • Environmental Controls
  • Physical Security: Awareness /Training
  • Physical Security Checklists

Module 06: Host Security

  • Host Security
  • OS Security
  • Linux Security
  • Securing Network Servers
  • Hardening Routers and Switches
  • Application/software Security
  • Data Security
  • Virtualisation Security

Module 07: Secure Firewall Configuration and Management

  • Firewalls and Concerns
  • What Firewalls Does?
  • What should you not Ignore?: Firewall Limitations
  • How Does a Firewall Work?
  • Firewall Rules
  • Types of Firewalls
  • Firewall Technologies
  • Firewall Topologies
  • Firewall Rule Set & Policies
  • Firewall Implementation
  • Firewall Administration
  • Firewall Logging and Auditing
  • Firewall Anti-evasion Techniques
  • Why Firewalls are Bypassed?
  • Full Data Traffic Normalisation
  • Data Stream-based Inspection
  • Vulnerability-based Detection and Blocking
  • Firewall Security Recommendations and Best Practices
  • Firewall Security Auditing Tools

Module 08: Secure IDS Configuration and Management

  • Intrusions and IDPS
  • IDS
  • Types of IDS Implementation
  • IDS Deployment Strategies
  • Types of IDS Alerts
  • IPS
  • IDPS Product Selection Considerations
  • IDS Counterparts

Module 09: Secure VPN Configuration and Management

  • Understanding Virtual Private Network (VPN)
  • How VPN works?
  • Why to Establish VPN ?
  • VPN Components
  • VPN Concentrators
  • Types of VPN
  • VPN Categories
  • Selecting Appropriate VPN
  • VPN Core Functions
  • VPN Technologies
  • VPN Topologies
  • Common VPN Flaws
  • VPN Security
  • Quality Of Service and Performance in VPNs

Module 10: Wireless Network Defense

  • Wireless Terminologies
  • Wireless Networks
  • Wireless Standard
  • Wireless Topologies
  • Typical Use of Wireless Networks
  • Components of Wireless Network
  • WEP (Wired Equivalent Privacy) Encryption
  • WPA (Wi-Fi Protected Access) Encryption
  • WPA2 Encryption
  • WEP vs. WPA vs. WPA2
  • Wi-Fi Authentication Method
  • Wi-Fi Authentication Process Using a Centralised Authentication Server
  • Wireless Network Threats
  • Bluetooth Threats
  • Wireless Network Security
  • Wi-Fi Discovery Tools
  • Locating Rogue Access points
  • Protecting from Denial-of-Service Attacks: Interference
  • Assessing Wireless Network Security
  • Wi-Fi Security Auditing Tool: AirMagnet WiFi Analyser
  • WPA Security Assessment Tool
  • Wi-Fi Vulnerability Scanning Tools
  • Deploying Wireless IDS (WIDS) and Wireless IPS (WIPS)
  • WIPS Tool
  • Configuring Security on Wireless Routers
  • Additional Wireless Network Security Guidelines

Module 11: Network Traffic Monitoring and Analysis

  • Network Traffic Monitoring and Analysis(Introduction)
  • Network Monitoring: Positioning your Machine at Appropriate Location
  • Network Traffic Signatures
  • Packet Sniffer: Wireshark
  • Detecting OS Fingerprinting Attempts
  • Detecting PING Sweep Attempt
  • Detecting ARP Sweep/ ARP Scan Attempt
  • Detecting TCP Scan Attempt
  • Detecting SYN/FIN DDOS Attempt
  • Detecting UDP Scan Attempt
  • Detecting Password Cracking Attempts
  • Detecting FTP Password Cracking Attempts
  • Detecting Sniffing (MITM) Attempts
  • Detecting the Mac Flooding Attempt
  • Detecting the ARP Poisoning Attempt
  • Additional Packet Sniffing Tools
  • Network Monitoring and Analysis
  • Bandwidth Monitoring

Module 12: Network Risk and Vulnerability Management

  • What is Risk?
  • Risk Levels
  • Risk Matrix
  • Key Risk Indicators(KRI)
  • Risk Management Phase
  • Enterprise Network Risk Management
  • Vulnerability Management

Module 13: Data Backup and Recovery

  • Introduction to Data Backup
  • RAID (Redundant Array Of Independent Disks) Technology
  • Storage Area Network (SAN)
  • Network Attached Storage (NAS)
  • Selecting Appropriate Backup Method
  • Choosing the Right Location for Backup
  • Backup Types
  • Conducting Recovery Drill Test
  • Data Recovery
  • Windows Data Recovery Tool
  • RAID Data Recovery Services
  • SAN Data Recovery Software
  • NAS Data Recovery Services

Module 14: Network Incident Response and Management

  • Incident Handling and Response
  • Incident Response Team Members: Roles and Responsibilities
  • First Responder
  • Incident Handling and Response Process
  • Overview of IH&R Process Flow

Se Exam Track...

You will sit the Certified Network Defender (CND) 312-38 exam on-site as part of the course. This is covered by your Certification Guarantee.

  • Exam Title: CND
  • Exam code: 312-38
  • Number of questions: 100
  • Duration: 4 Hours
  • Availability: ECC Exam
  • Test Format: Interactive Multiple Choice Questions

Se What's Included...

On this accelerated, all-inclusive course you'll get:

  • EC-Council CND Certified Instructor
  • Access to the official EC-Council Official Curriculum
  • Instructor-led CND exam preparation
  • EC-Council CND exam, which you'll take on the final day of the course

When you achieve your CND certification, you will be awarded a digital badge. This can be downloaded from EC-Council’s Aspen Portal.

Se Prerequisites...

There are currently no prerequisites for this course but having a basic understanding of Network Security will help.

Är du redo för din Firebrand kurs?

Vi intervjuar alla potentiella deltagare om deras bakgrund, utbildning, certifiering och personliga inställning. Om du kommer igenom denna process så har du riktigt goda möjligheter att klara din certifiering.

Firebrand Training erbjuder en ambitiös utbildningsmiljö som förutsätter att du verkligen dedikerar dig till kursen. Ovanstående förkunskaper är endast vägledande, många deltagare med mindre erfarenhet men med en annan bakgrund eller kunskap har framgångsrikt genomfört sin utbildning hos Firebrand Training.

Om du funderar på huruvida du uppfyller rekommenderade förkunskaper vänligen ring oss på (0)8 52 50 01 66 och prata med en av våra utbildningsrådgivare som kan hjälpa dig.

Se När...

EC-Council CND Kursdatum

EC-Council - Certified Network Defender (CND)

Startar

Slutar

Tillgänglighet

Registrera

26/11/2019 (Tisdag)

29/11/2019 (Fredag)

Avslutad

 

16/3/2020 (Måndag)

19/3/2020 (Torsdag)

Platser tillgängliga

Registrera

15/6/2020 (Måndag)

18/6/2020 (Torsdag)

Platser tillgängliga

Registrera

Vi har utbildat 72.589 kursdeltagare under 12 år. Vi har bett alla göra en utvärdering av vår accelererade utbildning. För närvarande har 96,77% sagt att Firebrand överträffat deras förväntningar:

"Very well organised and great environment for learning."
Kevin Callahan. (26/11/2019 till 29/11/2019)

"Great Course, Great Tutor - Second time at firebrand, and the general organisation and implementation of the courses is very well put together - takes all stresses out of the course. "
M.G.. (20/5/2019 till 23/5/2019)

"Excellent learning facility, great teacher and delivery of training."
J.M.. (20/5/2019 till 23/5/2019)

"Good facilities, good instructor and good course material."
M.B., Yorkshire Water. (20/5/2019 till 23/5/2019)

"Training course was comprehensive and Dave the trainer was very good at explaining how technical processes worked relating to each topic. "
Sam Reeves, Daisy Group. (4/2/2019 till 7/2/2019)

Senaste recensioner från våra studenter