
Who Should Get Trained in Network Security?
​
Certified Network Defender v2 is recommended for individuals who have fundamental knowledge of networking concepts. It will also help individuals from the below mentioned job roles progress further in their career:
​
-
Network Administrators
-
IT Administrators
-
Network Engineers
-
Data Analysts
-
Network Technicians
​
Course Description
The only true blue team network defense program! Cybersecurity now dominates the priorities of every enterprise striving to adapt to a post-COVID world. Forced to go remote, their workers’ identities and devices are the new security perimeter. In fact, cybersecurity for business is now as critical as internet access itself. The only program built for the world’s largest work-from-home experiment!
Course Duration : 5 Days
Course Outline
-
Network Attacks and Defense Strategies
-
Administrative Network Security
-
Technical Network Security
-
Network Perimeter Security
-
Endpoint Security-Windows Systems
-
Endpoint Security-Linux Systems
-
Endpoint Security- Mobile Devices
-
Endpoint Security-IoT Devices
-
Administrative Application Security
-
Data Security
-
Enterprise Virtual Network Security
-
Enterprise Cloud Network Security
-
Enterprise Wireless Network Security
-
Network Traffic Monitoring and Analysis
-
Network Logs Monitoring and Analysis
-
Incident Response and Forensic Investigation
-
Business Continuity and Disaster Recovery
-
Risk Anticipation with Risk Management
-
Threat Assessment with Attack Surface Analysis
-
Threat Prediction with Cyber Threat Intelligence
What will you learn?
Understanding network security management
Learn basics of first response and forensics
Establishing network security policies and procedures
Understanding indicators of Compromise, Attack, and Exposures(IoC, IoA, IoE)
Windows and Linux security administration
Building threat intelligence capabilities
Setting up mobile and IoT device security
Establishing and monitoring log management
Implementing data security techniques on networks
Implementing endpoint security
Embedding virtualization technology security
Configuring optimum firewall solutions
Determining cloud and wireless security
Understanding and using IDS/IPS technologies
Deploying and using risk assessment tools
Establishing Network Authentication, Authorization, Accounting (AAA)
SG Time Zone
10:00 AM - 6:00 PM
AU/NZ Time Zone :
8:00/10:00 AM - 4:00/6:00 PM
Training Starts @
10:00 AM - Philippines
10:00 AM - Hong Kong
10:00 AM - Brunei
09:00 AM - Cambodia
09:00 AM - Vietnam
08:30 AM - Myanmar
08:00 AM - Bangladesh
07:30 AM - Sri Lanka
To know more about course details, please download brochure.