Course Overview

Network Defense Essentials

Network Defense Essentials covers the fundamental concepts of information security and network defense. This introductory cybersecurity course is designed for today’s entry-level information security or cybersecurity career professionals and is ideal for learners aspiring to pursue a career in cybersecurity.

The course gives a holistic overview of the key components of information security, which include identification, authentication, and authorization, virtualization and cloud computing, wireless networks, mobile and loT devices, and data security. The interactive labs component ensures that learners receive the hands-on, practical experience required for a future in cybersecurity.

Learning Outcomes

Key issues plaguing the network security

Understand common network security vulnerabilities, threats, and challenges that organizations face in protecting their network infrastructure.

Essential network security protocols

Master critical security protocols including IPsec, SSL/TLS, VPNs, and other encryption protocols used to secure network communications.

Identification, authentication, and authorization concepts

Learn identity and access management principles including user identification, multi-factor authentication, and role-based access control systems.

Network security controls

  • Administrative controls (Frameworks, laws, acts, and security policies)
  • Physical controls (Physical security controls, workplace security, and environmental controls)
  • Technical controls (Network segmentation, firewall, IDS/IPS, honeypot, proxy server, VPN, SIEM, UBA, and anti-malware)

Fundamentals of virtualization, cloud computing, and cloud security

Understand virtualization technologies, cloud computing models, and implement security measures for virtual and cloud environments.

Wireless network fundamentals, wireless encryption, and security measures

Master wireless network technologies, encryption protocols like WPA3, and implement security controls for wireless infrastructure.

Fundamentals of mobile and IoT devices and their security measures

Learn mobile device security, IoT device protection, and implement security measures for connected devices and mobile platforms.

Cryptography and PKI Concepts

Understand cryptographic principles, public key infrastructure, digital certificates, and encryption technologies used in network security.

Data security, data encryption, and data backup and data loss prevention techniques

Implement data protection strategies including encryption, backup procedures, data loss prevention, and data classification systems.

Network traffic monitoring for suspicious traffic

Develop skills in network traffic analysis, anomaly detection, and monitoring techniques to identify and respond to suspicious network activities.

Exam Information

Exam Title : Network Defense Essentials (NDE)
Exam Code : 112-51
Duration : 2 Hours
Test Format : Multiple Choice

Course Content & Modules

Network Security Fundamentals

Module 01

Learn fundamental network security concepts, protocols, and principles essential for protecting network infrastructure.

Identification, Authentication and Authorization

Module 02

Understand identity management, authentication methods, and authorization mechanisms for secure access control.

Network Security Controls - Administrative Controls

Module 03

Develop security policies, procedures, governance frameworks, and administrative controls for network protection.

Network Security Controls - Physical Controls

Module 04

Implement physical security measures including facility access controls, environmental monitoring, and equipment protection.

Network Security Controls - Technical Controls

Module 05

Deploy technical security controls including firewalls, IDS/IPS, network segmentation, and security appliances.

Virtualization and Cloud Computing

Module 06

Understand virtualization technologies, cloud computing models, and implement security controls for virtual and cloud environments.

Wireless Network Security

Module 07

Secure wireless networks through encryption protocols, access point security, and wireless intrusion detection systems.

Mobile Device Security

Module 08

Implement mobile device security through MDM solutions, app security, device encryption, and mobile threat protection.

IoT Device Security

Module 09

Secure IoT devices through network segmentation, device authentication, firmware protection, and IoT security protocols.

Cryptography and PKI

Module 10

Master cryptographic principles, public key infrastructure, digital certificates, and encryption technologies for network security.

Data Security

Module 11

Protect sensitive data through encryption, data classification, backup strategies, and data loss prevention techniques.

Network Traffic Monitoring

Module 12

Monitor network traffic patterns, analyze network behavior, and detect anomalies using network monitoring tools and techniques.

Course Information

Duration
5 Days
Level
Beginner
Certification
EC-Council
Language
English & Malay
Format
Online & Physical

Ready to Start?

Certification

Earn Your Industry-Recognized Certificate

Upon successfully passing the examination for this course, participants will be awarded a certificate, an example of which is shown below.

Globally recognized EC-Council certification
Validates ethical hacking expertise
Enhances career opportunities in cybersecurity
Cybersecurity Certificate
Certified Professional
TEC Logo
Go Back Top