Course Overview

Certified Network Defender

EC-Council's Certified Network Defender (C|ND) is an essential vendor-neutral network security certification for every IT and systems administrator who needs to operate with a secure mindset. Students will learn the critical skills required to defend their networks and operating environments across local networks, endpoints, cloud infrastructure, applications, OT, and Mobile.

They will also acquire knowledge of effective proper log analysis, network traffic monitoring, basic investigation and response, as well as business continuity and disaster recovery.Additionally, they will dive into threats, analyzing the attack surface, and studying threat prediction and threat intelligence as it relates to their administration and defense responsibilities.


Often referred to as blue-teaming, C|NDs will be able to apply defense and countermeasure strategies in their organizations, playing a critical role not only in attack prevention but also in detection, response, and remediation as they configure networks and systems to operate securely. The C|ND program will cover the concepts and fortify skills through hands-on practice across over 100+ labs delivered on live target machines.

Learning Outcomes

Planning and administering network security for organizations
Recognizing security risks, threats, and vulnerabilities
Ensuring compliance with regulatory standards
Designing and implementing network security policies
Applying security principles in distributed and mobile computing environment
Implementing Identity and Access Management, encryption, and network segmentation
Managing Windows and Linux Security Administration
Addressing security risks in mobile devices and IoT
Implementing strong data security techniques
Managing security in virtualization technologies and cloud platforms
Implementing wireless network security
Conducting risk and vulnerability assessments
Providing first response to security incidents
Identifying Indicators of Compromise and Attack
Integrating threat intelligence for proactive defense

Exam Information

Exam Title : Certified Ethical Hacker (CEH)
Exam Code : 312-38
Availability : EC-Council Exam Portal
Duration : 4 Hours
Test Format : Multiple Choice

Who Can Apply?

Students/IT Professionals/Any other industry professionals planning a career in cybersecurity. Anyone who wants to start a career in the blue team and network security.

Course Content & Modules

Network Attacks and Defense Strategies

Module 01

Learn to identify, analyze, and defend against various network attacks including DDoS, man-in-the-middle, and reconnaissance techniques.

Administrative Network Security

Module 02

Explore network security policies, access controls, user management, and administrative procedures for secure network operations.

Technical Network Security.

Module 03

Master technical security controls including firewalls, intrusion detection systems, VPNs, and network segmentation strategies.

Network Perimeter Security.

Module 04

Implement comprehensive perimeter defense mechanisms including DMZ design, border security, and external threat protection.

Endpoint Security - Windows Systems

Module 05

Secure Windows endpoints with antivirus, host-based firewalls, patch management, and endpoint detection and response (EDR) solutions.

Endpoint Security - Linux Systems

Module 06

Protect Linux systems through hardening techniques, SELinux configuration, log monitoring, and security best practices.

Endpoint Security - Mobile Devices

Module 07

Secure mobile devices through MDM solutions, app sandboxing, encryption, and mobile threat defense strategies.

Endpoint Security - IoT Devices

Module 08

Implement security controls for IoT devices including network segmentation, device authentication, and firmware protection.

Administrative Application Security.

Module 09

Develop secure application deployment practices, code review processes, and application-level security controls.

Data Security.

Module 10

Protect sensitive data through encryption, data loss prevention (DLP), database security, and information classification.

Enterprise Virtual Network Security

Module 11

Secure virtualized environments through hypervisor security, virtual network isolation, and VM-level protection mechanisms.

Enterprise Cloud Network Security

Module 12

Implement cloud security controls including cloud access security brokers, identity management, and secure cloud architectures.

Enterprise Wireless Network Security

Module 13

Secure wireless networks with WPA3, enterprise authentication, rogue access point detection, and wireless intrusion prevention.

Network Traffic Monitoring and Analysis

Module 14

Monitor network traffic patterns, detect anomalies, and analyze network behavior using tools like Wireshark and network analyzers.

Network Logs Monitoring and Analysis

Module 15

Implement centralized logging, log analysis techniques, SIEM solutions, and correlation rules for threat detection.

Incident Response and Forensic Investigation.

Module 16

Develop incident response procedures, digital forensics capabilities, evidence collection, and post-incident analysis techniques.

Business Continuity and Disaster Recovery.

Module 17

Plan and implement business continuity strategies, disaster recovery procedures, and backup/recovery solutions for network infrastructure.

Risk Anticipation with Risk Management.

Module 18

Assess network security risks, implement risk mitigation strategies, and develop comprehensive risk management frameworks.

Threat Assessment with Attack Surface Analysis.

Module 19

Identify and analyze network attack surfaces, conduct vulnerability assessments, and map potential attack vectors.

Threat Prediction with Cyber Threat Intelligence.

Module 20

Leverage threat intelligence feeds, conduct threat hunting activities, and develop proactive defense strategies based on emerging threats.

Course Information

Duration
5 Days
Level
Intermediate
Certification
EC-Council
Language
English & Malay
Format
Online & Physical

Ready to Start?

Certification

Earn Your Industry-Recognized Certificate

Upon successfully passing the examination for this course, participants will be awarded a certificate, an example of which is shown below.

Globally recognized EC-Council certification
Validates ethical hacking expertise
Enhances career opportunities in cybersecurity
Cybersecurity Certificate
Certified Professional
TEC Logo
Go Back Top