Have a question?
Name
Email
Preferred Mode of Training
Notes
Delete file
Are you sure you want to delete this file?
Message sent Close

Certified Network Defender (CND)

0
0 reviews
  • Description
  • Reviews
3Microsoft Security Operations Analyst.png

CERTIFIED NETWORK DEFENDER (CND)

COURSE DESCRIPTION

Certified Network Defender has been designed by industry experts to help IT Professionals play an active role in the protection of digital business assets and detection and response to cyber threats, while leveraging threat intelligence to predict them before they happen. CND is a network security course designed to help organizations create and deploy the most comprehensive network defense system. 

WHO IS IT FOR:

Certified Network Defender is recommended for individuals who have fundamental knowledge of networking concepts. It will also help individuals from the below mentioned job roles progress further in their career:

  • Network Administrators
  • IT Administrators
  • Network Engineers
  • Data Analysts
  • Network Technicians

RECOMMENDED EXPERIENCE

  • Working knowledge of IT networking and basic cybersecurity concepts will be an advantage

COURSE OUTLINE

  • Module 01: Network Attacks and Defense Strategies
  • Module 02: Administrative Network Security
  • Module 03: Technical Network Security
  • Module 04: Network Perimeter Security
  • Module 05: Endpoint Security – Windows Systems
  • Module 06: Endpoint Security – Linux Systems
  • Module 07: Endpoint Security – Mobile Devices
  • Module 08: Endpoint Security – IoT Devices
  • Module 09: Administrative Application Security
  • Module 10: Data Security
  • Module 11: Enterprise Virtual Network Security
  • Module 12: Enterprise Cloud Security
  • Module 13: Enterprise Wireless Network Security
  • Module 14: Network Traffic Monitoring and Analysis
  • Module 15: Network Logs Monitoring and Analysis
  • Module 16: Incident Response and Forensics Investigation
  • Module 17: Business Continuity and Disaster Recovery
  • Module 18: Risk Anticipation with Risk Management
  • Module 19: Threat Assessment with Attack Surface Analysis
  • Module 20: Threat Prediction with Cyber Threat Intelligence

For FULL COURSE OUTLINE, please contact us. Please contact us for the schedules and for booking a private class.

Inquire Now

Archive

Working hours

Monday 9:00 am - 6.00 pm
Tuesday 9:00 am - 6.00 pm
Wednesday 9:00 am - 6.00 pm
Thursday 9:00 am - 6.00 pm
Friday 9:00 am - 6.00 pm
Saturday Closed
Sunday Closed