EC-Council CND: Certified Network Defender v2 Training

Create and deploy the most comprehensive network defense system with our 5-day EC-Council-authorized CND certification preparation course delivered by accredited trainers.

COURSE SCHEDULE ENQUIRE NOW

  230 Ratings

               478 Participants

Group Discount

Upto 15% OFF

24x7 Accessibility to learning resources

Complete exam guidance

EC-Council Accredited Training Partner (ATP)

Extensive hands-on and live case practical training

CND v2 Training Course

Vinsys' vendor-neutral Certified Network Defender v2 course brings a dedicated focus on network security and defense. It enables you to perform an active role in protecting digital business assets, detecting/responding to cyber threats, and leveraging threat intelligence to predict them before they occur. 

The ANSI/ISO/IEC-accredited CND training provides an unbiased approach to learning secure-networking practices while explaining how to analyze/harden computing systems prevalent in the current IT infrastructure.

Overall, the NICE-framework-mapped certification course addresses all the latest tools, techniques, and methodologies utilized by top cybersecurity experts and helps you win the war against network breaches. 

Our next-generation network security CND training also prepares you for the 312-38 exam, necessary for securing EC-Council’s Certified Network Defender accreditation.

Course Curriculum


Audience

  • Individuals interested in a cybersecurity career.
  • Those who wish to qualify for entry-level roles such as Entry-level Network Administrators, Entry-level Network Security Administrators, Data Security Analysts, Junior Network Security Engineers, Junior Network Defense Technicians, Security Analysts, and Security Operators.
  • IT professionals exploring career transitions. 
  • Cisco or Microsoft-certified Network Administrators/Engineers.
  • Wireshark-certified Network Analysts.
  • SolarWinds/Juniper/CompTIA Network+ or Security+ accredited professionals. 
  • Associated Job Roles:

         Security Analysts.
         Cyber Security Analysts (Senior/Principal).
         Vulnerability Analysts (Principal).
         Network Administrators.
         Staff Network Engineers.
         Information Systems Security Managers.
         Mid-level Penetration Testers.
         Staff Network Engineers.
         Sr. Digital Forensics Analysts.
         Linux System Administrators.
         Cybersecurity Engineers II Red Team.

  • The ones willing to complete EC-Council's CND qualification. 

Prerequisites

  • Fundamental knowledge of networking concepts.
  • Those trying to attempt the CND exam without official EC-Council training must show a minimum of 2 years of work experience in the InfoSec domain.

Course Objectives

  • Understand network security management.
  • The basics of first response and forensics.
  • Establish network security policies and procedures.
  • Learn the indicators of Compromise, Attack, and Exposures (IoC, IoA, IoE).
  • Windows and Linux security administration.
  • Build threat intelligence capabilities.
  • Set up mobile and IoT device security.
  • Establish/Monitor log management.
  • Implement data security techniques on networks.
  • Implement endpoint security.
  • Embed virtualization technology security.
  • Configure optimum firewall solutions.
  • Determine cloud and wireless security.
  • Understand and utilize IDS/IPS technologies.
  • Deploy and use risk assessment tools.
  • Establish Network Authentication, Authorization & Accounting (AAA).

About The Examinnation

  • Exam:  312-38.          
  • Skills Tested:      Network Defense Management and Perimeter Protection, 

                                      Endpoint and Application/Data Protection, 
                                      Enterprise Virtual/Cloud and Wireless Network Protection 
                                     & Incident Detection, Response and Prediction. 

  • Certification Awarded:   The Certified Network Defender.
  • Exam Format:               100 Multiple-choice Questions with 60-85% Cut Scores.     
  • Duration:                       4 Hours. 

Read More..

Get in touch

By providing your contact details, you agree to our Privacy policy

Training Options


ONLINE TRAINING

Instructor-Led Session


  • EC-Council Accredited Training Partner                                
  • Authorized Content  
  • Experienced Subject Matter Experts
  • 24*7 leaner assistance and support

CORPORATE TRAINING

Customized to your team's need


  • Domain-customization
  • ROI-optimization & Group Discounts
  • Enterprise-Class Learning Management System (LMS)
  • Enhanced Reporting For Individuals And Teams
  • 24x7 Teaching Assistance And Support 

Course Outline


  • Network Attacks & Defense Strategies

Explaining essential terminologies related to network security attacks.
Describing various examples of network-level attack techniques.
Examples of host-level attack techniques. 
Examples of application-level attack techniques.
Examples of social engineering attack techniques. 
Examples of email attack techniques.
Describing examples of mobile device-specific attack techniques.
Cloud-specific attack techniques.
Wireless network-specific attack techniques.
Describing an attacker’s hacking methodologies and frameworks.
Understanding fundamental goals, benefits, and challenges in network defense.
Explaining the continual/adaptive security strategy.
The defense-in-depth security strategy.

  • Administrative Network Security

Obtaining compliance with regulatory frameworks.
Discussing regulatory frameworks, laws, and acts.
Designing and developing security policies.
Conducting security awareness training.
Discussing other administrative security measures.

  • Technical Network Security

Discussing access control principles, terminologies, and models.
Redefining Access Control security in today’s distributed and mobile computing world.
Discussing Identity and Access Management (IAM) concepts.
Cryptographic security techniques and cryptographic algorithms.  
The security benefits of network segmentation techniques.
The essential network security solutions.
Discussing the critical network security protocols.

  • Network Perimeter Security

Understanding firewall security concerns, capabilities, and limitations.
Different types of firewall technologies and their usage.
Firewall topologies and their use.
Distinguishing between hardware, software, host, network, internal, and external firewalls.
Selecting a firewall based on its deep traffic inspection capability.
Discussing the firewall implementation/deployment process.
Recommendations and best practices for a secure firewall implementation/deployment.
Firewall administration activities.
Understanding the role, capabilities, limitations, and concerns in IDS deployments.
Discussing the IDS/IPS classification.
Various components of IDS.
The effective deployment of network and host-based IDS.
Learning to deal with false positive/negative IDS alerts.
Discussing the selection of appropriate IDS solutions.
Various NIDS/HIDS solutions with their intrusion detection capabilities.
Router/Switch security measures, recommendations, and best practices.
Leveraging Zero Trust Model Security using Software-Defined Perimeter (SDP).

  • Endpoint Security-Windows Systems

Understanding Windows OS and security concerns.
Discussing Windows security components.
Various Windows security features.
Windows security baseline configurations.
Windows user account and password management.
Windows patch management.
User access management.
Windows OS security-hardening techniques.
Windows active directory security best practices.
Windows network services and protocol security.

 

  • Endpoint Security-Linux Systems

Understanding Linux OS and security concerns.
Discussing Linux installation and patching.
Linux OS Hardening techniques.
Linux user access and password management.
Linux network and remote access security.
Various Linux security tools/frameworks.

  • Endpoint Security- Mobile Devices

Discussing common mobile usage policies in enterprises.
The security risks/challenges associated with enterprise mobile usage policies.
The security guidelines for mitigating risks associated with enterprise mobile usage policies.
Discussing/Implementing enterprise-level mobile security management solutions.
General security guidelines and best practices on mobile platforms. 
Discussing security guidelines and tools for android devices.
Security guidelines and tools for iOS devices.

  • Endpoint Security-IoT Devices

Understanding IoT devices, their need, and application areas.
The IoT ecosystem and communication models.
The security challenges/risks associated with IoT-enabled environments.
Discussing the security in IoT-enabled environments.
Security measures for IoT-enabled environments.
IoT security tools and best practices.
Discussing/Referring to various standards, initiatives, and efforts for IoT security.

  • Administrative Application Security

Discussing/Implementing application whitelisting and blacklisting.
Application sandboxing.
Application patch management.
The Web Application Firewall (WAF).

  • Data Security

Understanding data security and its importance.
Discussing the implementation of data access controls.
The encryption of Data-at-rest.
Data-at-transit, and Data-at-transit between browser and web server. 
The encryption of Data-at-transit in email delivery.
Data masking concepts, backup, and retention.
Data destruction and Data Loss Prevention (DLP) concepts.

  • Enterprise Virtual Network Security

Understanding the essential virtualization concepts.
Discussing Network Virtualization (NV) security.
Software-defined Network (SDN) security.
Network Function Virtualization (NFV) security.
OS Virtualization security.
The security guidelines, recommendations, and best practices for Containers/Dockers/Kubernetes.

  • Enterprise Cloud Network Security

Understanding the cloud computing fundamentals.
The insights of cloud security.
Evaluating CSP for security before consuming cloud service.
Discussing security in Amazon (AWS)/Microsoft Azure clouds and the Google Cloud Platform (GCP). 
The general security best practices and tools for cloud security.

  • Enterprise Wireless Network Security

Understanding wireless network fundamentals, encryption mechanisms, and authentication methods.
Discussing and implementing wireless network security measures.

  • Network Traffic Monitoring & Analysis

Understanding the need/advantages of network traffic monitoring.
Setting up the environment for network monitoring.
Determining baseline traffic signatures for normal/suspicious network traffic.
Performing network monitoring/analysis for suspicious traffic using Wireshark.
Discussing network performance and bandwidth monitoring concepts.

  • Network Logs Monitoring & Analysis

Understanding the logging concepts.
Discussing log monitoring and analysis on Windows, Linux, or Mac systems.  
Discussing log monitoring and analysis on Firewalls, Routers, or Web servers.
Discussing the centralized log monitoring/analysis.

  • Incident Response & Forensic Investigation

Understanding the incident response concept and role of a first responder. 
Discussing the Do’s/Don’ts in the first response.
Describing incident-handling/response and forensics investigation processes.

  • Business Continuity & Disaster Recovery

Business Continuity (BC) and Disaster Recovery (DR) introduction. 
Discussing BC/DR activities.
Explaining Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP).
Discussing BC/DR standards.

  • Risk Anticipation with Risk Management

Understanding risk management concepts.
Learning to manage risks through a risk management program. 
Different Risk Management Frameworks (RMF).
Managing vulnerabilities through the vulnerability management program.
Learning vulnerability assessment and scanning.

  • Threat Assessment with Attack Surface Analysis

Understanding the attack surface analysis and visualizing your attack surface.
Learning to identify Indicators of Exposures (IoE).
Conducting attack simulations.
Reducing the attack surface.

  • Threat Prediction with Cyber Threat Intelligence

Understanding the role of cyber threat intelligence in network defense. 
The types of threat intelligence.
The indicators of threat intelligence: Indicators of Compromise (IoCs) and Indicators of Attack (IoA).
The layers of threat intelligence.
Learning to leverage and consume threat intelligence for proactive defense.

Course Reviews


FAQ's


It is the only true blue-team comprehensive network defense program that incorporates critical secure network skills and pays enhanced attention to threat prediction, business continuity, or disaster recovery.

It comprises Protect, Detect, Respond, and Predict for efficiently responding to network attacks and stopping them before they happen.

  • Protect

Defense-In-Depth Security.
Adequately Designed, Implemented, and Enforced Security Policies.
Security Architectures.
Appropriate Configuration.
Right Selection of Security Controls.

  • Detect

Traffic Monitoring.
Log Management/Monitoring.
Anomalies Detection.

  • Respond

Incident Response.
Forensics Investigation.
Business Continuity (BC).
Disaster Recovery (DR).

  • Predict

Risk/Vulnerability Assessment.
Attack Surface Analysis.
Threat Intelligence.

It is based on common job role frameworks recognized by organizations worldwide. Moreover, the CND takes your employees through multiple latest technologies ranging from Cloud, IoT, Virtualization and Remote Worker Threats, Attack Surface Analysis to SDN, Network Function Virtualization (NFV), docker, Kubernetes, and container security. 

Altogether, the CND v2 training and certification facilitate impregnable cyber defense practices within your enterprise.

The Certified Network Defender v2 program acts as your pathway to a career in a blue team by helping you learn beyond the technological aspects of network security. It explains various ways of ensuring security across cloud platforms, from Amazon Web Services to Microsoft Azure Cloud and Google Cloud. 

At the same time, the CND course allows you to acquire skills for building perimeter defense. Its 80+ complex labs present ample opportunities to learn under simulated threat environments while gaining real-world skills before starting a professional career.

It enables them to identify the parts of an organization that need to be reviewed/tested for security vulnerabilities and work on reducing, preventing, or mitigating risks in the network.

It could depend on the job profile and experience; however, as per PayScale, the average Network Security Engineer may earn an annual package of $87,000, and yearly salaries can go as high as $112,000. 

Yes, acknowledging the projected 27% of corporate data traffic bypassing perimeter security and flowing directly from mobile/portable devices to the cloud, the CND v2 stresses the Enterprise Mobile Device Security and redefines Access Control Security.

It can be described as the most practical network security/defense training ever, and as hands-on as network defense can get. Based on a thorough job task analysis, over 50% of the CND course is lab-intensive to ensure the application of real-world skills.

Besides being a globally-respected Individual/Corporate IT training provider, Vinsys is also admired as the top EC-Council Accredited Training Partner (ATP). Its unmatchable offerings, accredited instructors, customizable skilling programs, and round-the-clock learner support ensure the most detailed upskilling experiences, a must for capitalizing on valuable network security opportunities.