top of page

Who Should Get Trained in Network Security?

Certified Network Defender v2 is recommended for individuals who have fundamental knowledge of networking concepts. It will also help individuals from the below mentioned job roles progress further in their career:

  • Network Administrators

  • IT Administrators

  • Network Engineers

  • Data Analysts

  • Network Technicians


Course Description

The only true blue team network defense program! Cybersecurity now dominates the priorities of every enterprise striving to adapt to a post-COVID world. Forced to go remote, their workers’ identities and devices are the new security perimeter. In fact, cybersecurity for business is now as critical as internet access itself. The only program built for the world’s largest work-from-home experiment!

Course Duration : 5 Days

Course Outline

  • Network Attacks and Defense Strategies

  • Administrative Network Security

  • Technical Network Security

  • Network Perimeter Security

  • Endpoint Security-Windows Systems

  • Endpoint Security-Linux Systems

  • Endpoint Security- Mobile Devices

  • Endpoint Security-IoT Devices

  • Administrative Application Security

  • Data Security

  • Enterprise Virtual Network Security

  • Enterprise Cloud Network Security

  • Enterprise Wireless Network Security

  • Network Traffic Monitoring and Analysis

  • Network Logs Monitoring and Analysis

  • Incident Response and Forensic Investigation

  • Business Continuity and Disaster Recovery

  • Risk Anticipation with Risk Management

  • Threat Assessment with Attack Surface Analysis

  • Threat Prediction with Cyber Threat Intelligence

What will you learn?

Understanding network security management
Learn basics of first response and forensics

Establishing network security policies and procedures

Understanding indicators of Compromise, Attack, and Exposures(IoC, IoA, IoE)

Windows and Linux security administration

Building threat intelligence capabilities

Setting up mobile and IoT device security

Establishing and monitoring log management

Implementing data security techniques on networks

Implementing endpoint security

Embedding virtualization technology security

Configuring optimum firewall solutions

Determining cloud and wireless security

Understanding and using IDS/IPS technologies

Deploying and using risk assessment tools

Establishing Network Authentication, Authorization, Accounting (AAA)


Mar., Mon 14 - Fri 18 | SG Time Zone

Apr., Mon 18 - Fri 22 | AU/NZ Time Zone

May., Mon 16 - Fri 20 | SG Time Zone

Jun., Mon 13 - Fri 17 | AU/NZ Time Zone


Course Outline

SG Time Zone
0 AM - 6:00 PM

AU/NZ Time Zone :
8:00/10:00 AM - 4:00/6:00 PM

Training Starts @

10:00 AM - Philippines

10:00 AM - Hong Kong

10:00 AM - Brunei

09:00 AM - Cambodia

09:00 AM - Vietnam

08:30 AM - Myanmar

08:00 AM - Bangladesh

07:30 AM - Sri Lanka

To know more about course details, please download brochure.

If you find our scheduled dates will not work for you , Please send us an email for your desired training dates.
bottom of page