top of page
Blue Background

Certified Network Defender (CND)

Certified Network Defender

 

 

Duration - 5 Days


1. INTRODUCTION

CNDv2 Module 01: Network Attacks and Defense Strategies

LO#01: Explain essential terminologies related to network security attacks

LO#02: Describe the various examples of network-level attack techniques

LO#03: Describe the various examples of application-level attack techniques

LO#04: Describe the various examples of social engineering attack techniques

LO#05: Describe the various examples of email attack techniques

LO#06: Describe the various examples of mobile device-specific attack techniques

LO#07: Describe the various examples of cloud-specific attack techniques

LO#08: Describe the various examples of wireless network-specific attack techniques

LO#09: Describe Attacker’s Hacking Methodologies and Frameworks

LO#10: Understand fundamental goal, benefits, and challenges in network defense

LO#11: Explain Continual/Adaptive security strategy

LO#12: Explain defense-in-depth security strategyLO#11: Explain Continual/Adaptive security strategy

 

Module 02 Administrative Network Security


LO#01: Learn to obtain compliance with regulatory framework and standards

LO#02: Discuss various Regulatory Frameworks, Laws, and Acts

LO#03: Learn to design and develop security policies

LO#04: Learn to conduct different type security and awareness training

LO#05: Learn to implement other administrative security measures

 

Module 03: Technical Network Security

LO#01: Discuss access control principles, terminologies, and models

LO#02: Redefine the Access Control in Today’s Distributed and Mobile Computing World

LO#03: Discuss Identity and Access Management (IAM):

LO#04: Discuss cryptographic security techniques

LO#05: Discuss various cryptographic algorithms

LO#06: Discuss security benefits of network segmentation techniques

LO#07: Discuss various essential network security solutions

LO# 08: Discuss various essential network security protocols

 

Module 04 Network Perimeter Security


LO#01: Understand firewall security concerns, capabilities, and limitations

LO#02: Understand different types of firewall technologies and their usage

LO#03: Understand firewall topologies and their usage

LO#04: Distinguish between hardware, software, host, network, internal, and external firewalls

LO#05: Select firewalls based on its deep traffic inspection capability

LO#06: Discuss firewall implementation and deployment process

LO#07: Discuss recommendations and best practices for secure firewall Implementation and deployment

LO#08: Discuss firewall administration concepts

LO#09: Understand role, capabilities, limitations, and concerns in IDS deployment

LO#10: Discuss IDS classification

LO#11: Discuss various components of ID

LO#12: Discuss effective deployment of network and host-based IDS

LO#13: Learn to how to deal with false positive and false negative IDS/IPS alerts

LO#14: Discuss the considerations for selection of an appropriate IDS/IPS solutions

LO#15: Discuss various NIDS and HIDS Solutions with their intrusion detection capabilities Snort

LO#16: Discuss router and switch security measures, recommendations, and best practices

LO#17: Leverage Zero Trust Model Security using Software-Defined Perimeter (SDP)

 

Module 05 Endpoint Security-Windows Systems

LO#01: Understand Window OS and Security Concerns

LO#02: Discuss Windows Security Components

LO#03: Discuss Various Windows Security Features

LO#04: Discuss Windows Security Baseline Configurations

LO#05: Discuss Windows User Account and Password Management

LO#06: Discuss Windows Patch Management

LO#07: Discuss User Access Management

LO#08: Windows OS Security Hardening Techniques

LO#09: Discuss Windows Active Directory Security Best Practices

LO#10: Discuss Windows Network Services and Protocol Security


Module 06 Endpoint Security-Linux Systems

LO#01: Understand Linux OS and security concerns

LO#02: Discuss Linux Installation and Patching

LO#03: Discuss Linux OS Hardening Techniques

LO#04: Discuss Linux User Access and Password Management

LO#05: Discuss Linux Network Security and Remote Access

LO#06: Discuss Various Linux Security Tools and Frameworks


Module 07 Endpoint Security- Mobile Devices

 

LO#01: Common Mobile Usage Policies in Enterprises

LO#02: Discuss Security Risk and Guidelines associated with Enterprises mobile usage policies

LO#04: Discuss and implement various enterprise-level mobile security management Solutions

LO#05: Discuss and implement general security guidelines and best practices on Mobile platforms

LO#06: Discuss Security guidelines and tools for Android devices

LO#07: Discuss Security guidelines and tools for iOS devices


Module 08 Endpoint Security-IoT Devices

LO#01: Understanding IoT Devices, their need and Application Areas

LO#02: Understanding IoT Ecosystem and Communication models

LO#03: Understand Security Challenges and risks associated with IoT-enabled environments

LO#04: Discuss the security in IoT-enabled environments

LO#05: Discuss Security Measures for IoT enabled IT Environments

LO#06: Discuss IoT Security Tools and Best Practices

LO#07: Discuss and refer various standards, Initiatives and Efforts for IoT Security


Module 09 Administrative Application Security
LO#01: Discuss and implement Application Whitelisting and Blacklisting

LO#02: Discuss and implement application Sandboxing

LO#03: Discuss and implement Application Patch Management

LO#04: Discuss and implement Web Application Firewall (WAF)


Module 10: Data Security

LO#1: Understand data security and its importance

LO##2: Discuss the implementation of data access controls

LO#03: Discuss the implementation of Encryption of Data at rest

LO#04: Discuss the implementation of Encryption of “Data at transit”

LO#05: Discuss Data Masking Concepts

LO#06: Discuss data backup and retention

LO#07: Discuss Data Destruction Concepts

LO#08: Data Loss Prevention Concepts


Module 11: Enterprise Virtual Network Security

LO#01: Discuss the evolution of network and security management concept in modern Virtualized IT Environments

LO#02: Understand Virtualization Essential Concepts

LO#03: Discus Network Virtualization (NV) Security

LO#04: Discuss SDN Security

LO#05: Discuss Network Function Virtualization (NFV) Security

LO#06: Discus OS Virtualization Security

LO#07: Discuss Security Guidelines, Recommendations and Best Practices for Containers

LO#08: Discuss Security Guidelines, Recommendations and Best practices for Dockers

LO#09: Discuss Security Guidelines, Recommendations and Best Practices for Kubernetes

 

Module 12: Enterprise Cloud Security

LO#01: Understand Cloud Computing Fundamentals

LO#02: Understanding the Insights of Cloud Security

LO#03: Evaluate CSP for Security before Consuming Cloud Service

LO#04: Discuss security in Amazon Cloud (AWS)

LO#05: Discuss security in Microsoft Azure Cloud

LO#06: Discuss security in Google Cloud Platform (GCP)

LO#07: Discuss general security best practices and tools for cloud security


Module 13: Wireless Network Security

LO#01: Understand wireless network fundamentals

LO#02: Understand wireless network encryption mechanisms

LO#03: Understand wireless network authentication methods

LO#04: Discuss and implement wireless network security measures

 

Module 14: Network Traffic Monitoring and Analysis

LO#01: Understand the need and advantages of network traffic monitoring

LO#02: Setting up the environment for network monitoring

LO#03: Determine baseline traffic signatures for normal and suspicious network traffic

LO#04: Perform network monitoring and analysis for suspicious traffic using Wireshark

LO#06: Discuss network performance and bandwidth monitoring tools and techniques

 

Module 15: Network Logs Monitoring and Analysis

LO#01: Understand logging concepts

LO#02: Discuss log monitoring and analysis on Windows systems

LO#03: Discuss log monitoring and analysis on Linux

LO#04: Discuss log monitoring and analysis on Mac

LO#05: Discuss log monitoring and analysis in Firewall

LO#06: Discuss log monitoring and analysis on Routers

LO#07: Discuss log monitoring and analysis on Web Servers

LO#08: Discuss centralized log monitoring and analysis


Module 16 Incident Response and Forensic Investigation

LO#01: Understand incident response concept

LO#02: Understand the role of first responder in incident response

LO#03: Discuss Do’s and Don’t in first response

LO#04: Describe incident handling and response process

LO#05: Describe forensics investigation process

 

Module 17 Business Continuity and Disaster Recovery

LO#01: Introduction to Business Continuity (BC) and Disaster Recovery (DR) concepts

LO#02: Discuss BC/DR Activities

LO#03: Explain Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP)

LO#04: Discuss BC/DR Standards

 

Module 18 Risk Anticipation with Risk Management

LO#01: Understand risk management concepts

LO#02: Learn to manage risk though risk management program

LO#03: Learn different Risk Management Frameworks (RMF)

LO#04: Learn to manage vulnerabilities through vulnerability management program

LO#05: Learn vulnerability Assessment and Scanning

 

Module 19 Threat Assessment with Attack Surface Analysis

LO#01: Understand the attack surface concepts

LO#02: Learn to understand and visualize your attack surface

LO#03: Learn to identify Indicators of Exposures (IoE)

LO#04: Learn to perform attack simulation

LO#05: Learn to reduce the attack surfacev

LO#06: Discuss attack surface analysis specific to Cloud and IoT

 

Module 20 Threat Prediction with Cyber Threat Intelligence

LO#01: Understand role of cyber threat intelligence in network defense

LO#02: Understand the types of threat Intelligence

LO#03: Understand the Indicators of Threat Intelligence: Indicators of Compromise (IoCs) and Indicators of Attack (IoA)

LO#04: Understand the layers of Threat Intelligence

LO#05: Learn to leverage/consume threat intelligence for proactive defense

bottom of page