SlideShare a Scribd company logo
CERTIFIED NETWORK DEFENDER
The Ultimate Certification for Network AdministratorsEC-Council
Certified
DNetwork Defender
NC
THE ULTIMATE CERTIFICATION FOR
NETWORK ADMINISTRATORS
IF YOUR IT CREW IS NOT INTO
SECURITY,
YOU JUST WON’T HAVE
SECURITY
EC-Council
PROTECT - DETECT - RESPOND.
CERTIFIED NETWORK DEFENDER
CERTIFIED NETWORK DEFENDER
The Ultimate Certification for Network AdministratorsEC-Council
Course Description
Certified Network Defender (CND ) is a vendor-neutral,
hands-on, instructor-led comprehensive network security
certificationtrainingprogram.Itisaskills-based,labintensive
program based on a job-task analysis and cybersecurity
education framework presented by the National Initiative
of Cybersecurity Education (NICE). The course has also
been mapped to global job roles and responsibilities and the
Department of Defense (DoD) job roles for system/network
administrators. The course is designed and developed after
extensive market research and surveys.
The program prepares network administrators on network
security technologies and operations to attain Defense-
in-Depth network security preparedness. It covers the
protect, detect and respond approach to network security.
The course contains hands-on labs, based on major network
security tools and techniques which will provide network
administrators real world expertise on current network
security technologies and operations. The study-kit provides
you with over 10 GB of network security best practices,
assessments and protection tools. The kit also contains
templates for various network policies and a large number of
white papers for additional learning.
Course Duration: 5 days
Time: 9.00 AM to 5.00 PM
CERTIFIED NETWORK DEFENDER
The Ultimate Certification for Network AdministratorsEC-Council
Exam details:
CERTIFIED NETWORK DEFENDER
The Ultimate Certification for Network AdministratorsEC-Council
Exam title:
Certified Network Defender (CND)
Exam code:
312-38
Number of questions:
100
Duration:
4 Hours
Availability:
ECCExam
Test Format:
Interactive Multiple Choice Questions
CERTIFIED NETWORK DEFENDER
The Ultimate Certification for Network AdministratorsEC-Council
What will you learn?
CERTIFIED NETWORK DEFENDER
The Ultimate Certification for Network AdministratorsEC-Council
Student will learn about various network security
controls, protocols, and devices
Student will able to determine appropriate location
for IDS/IPS sensors, tuning IDS for false positives
and false negatives, and configurations to harden
security through IDPS technologies
Students will able to implement secure VPN
implementation for their organization
Student will able identify various threats to wireless
network and learn how to mitigate them
Student will able to monitor and conduct signature
analysis to detect various types of attacks and policy
violation activities.
Student will able to perform risk assessment,
vulnerability assessment/scanning through various
scanning tools and generate detailed reports on it
Student will able to identify the critical data, choose
appropriate back up method, media and technique
to perform successful backup of organization data
on regular basis
Student will able to provide first response to the
network security incident and assist IRT team and
forensics investigation team in dealing with an
incident.
Students will able to troubleshoot their network for
various network problems
Student will able identify various threats on
organization network
Student will learn how to design and implement
various security policies for their organizations
Studentwilllearntheimportanceofphysicalsecurity
and able to determine and implement various
physical security controls for their organizations
Student will able to harden security of various hosts
individually in the organization’s network
Student will able to choose appropriate firewall
solution, topology, and configurations to harden
security through firewall
CERTIFIED NETWORK DEFENDER
The Ultimate Certification for Network AdministratorsEC-Council
Organizational focus on cyber defense is more
important than ever as cyber breaches have a
far greater financial impact and can cause broad
reputational damage.
Despite best efforts to prevent breaches, many
organizations are still being compromised. Therefore
organizations must have, as part of their defense
mechanisms, trained network engineers who are
focused on protecting, detecting, and responding to
the threats on their networks.
Network administrators spends a lot of time with
network environments, and are familiar with
network components, traffic, performance and
utilization, network topology, location of each
system, security policy, etc.
So, organizations can be much better in defending
themselves from vicious attacks if the IT and
network administrators equipped with adequate
network security skills .Thus Network administrator
can play a significant role in network defense and
become first line of defense for any organizations.
Why Certified Network Defender?
“While there will be over 1.5 million cyber security
jobs that remain unfilled by 2019, millions of IT and
Networkadministratorsremainuntrainedonnetwork
defense techniques”
- Michael Brown, CEO at Symantec,
the world’s largest security software vendor.
CERTIFIED NETWORK DEFENDER
The Ultimate Certification for Network AdministratorsEC-Council
There is no proper tactical network security training
that is made available for network administrators
which provides them core network security skills.
Students enrolled in the Certified Network Defender
course, will gain a detailed understanding and hands
on ability to function in real life situations involving
network defense. They will gain the technical depth
required to actively design a secure network in your
organization.Thisprogramwillbeakintolearningmath
instead of just using a calculator. This course gives you
the fundamental understanding of the true construct
of data transfer, network technologies, software
technologies so that you understand how networks
operate, understand what software is automating and
how to analyze the subject material.
You will learn how to protect, detect and respond to
the network attacks. You will learn network defense
fundamentals, the application of network security
controls, protocols, perimeter appliances, secure IDS,
VPN and firewall configuration. You will then learn the
intricacies of network traffic signature, analysis and
vulnerability scanning which will help you when you
design greater network security policies and successful
incident response plans. These skills will help you foster
resiliency and continuity of operations during attacks.
“Cyber Security is commonly the first thing on the
minds of CIO but is, in many cases, an after thought for
the IT department”
- Jay Bavisi
President, EC-Council
CERTIFIED NETWORK DEFENDER
The Ultimate Certification for Network AdministratorsEC-Council
World's Biggest Data Breaches
Research by Miriam Quick, Ella Hollowood, Christian Miles, Dan Hampson
Source: http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
What are the Domains of CND?
CERTIFIED NETWORK DEFENDER
The Ultimate Certification for Network AdministratorsEC-Council
Module 01
Module 02
Module 03
Module 04
Module 05
Module 06
Module 07
Module 08
Module 09
Module 10
Module 11
Module 12
Module 13
Module 14
Network Security Controls, Protocols, and Devices
Network Security Policy Design and Implementation
Physical Security
Host Security
Secure Firewall Configuration and Management
Secure VPN Configuration and Management
Secure IDS Configuration and Management
Wireless Network Defense
Network Traffic Monitoring and Analysis
Network Risk and Vulnerability Management
Data Backup and Recovery
Network Incident Response and Management
Computer Network and Defense Fundamentals
Network Security Threats, Vulnerabilities, and Attacks
Who Is It For?
Network
Administrators
Network Defense
Technicians
Anyone who
involves in network
operations
Security Operator
CND Analyst
Network security
Administrators
Network Security
Engineer
Security Analyst
CERTIFIED NETWORK DEFENDER
The Ultimate Certification for Network AdministratorsEC-Council
CERTIFIED NETWORK DEFENDER
The Ultimate Certification for Network AdministratorsEC-Council
What job roles would need the CND specific skills?
MAPPING SUMMARY
I/A Framework
Categories
I/A Framework Specialty
Areas
EC-Council
Certification
Estimated
Framework
Proficiency Level
Match (1-4)
C3 Relation
Category
Securely Provision
Specialty areas
responsible for
conceptualizing,
designing, and building
secure information
technology (IT)
systems
Information Assurance
(IA) Compliance
CND 2 Related
Software Assurance and
Security Engineering
ECSP 2 Related
Systems Security
Architecture
CND 3 Related
Technology Research and
Development
CND 3 Related
System Requirements
Planning
CND 2 Related
Test and Evaluation CND 3 Related
Systems Development CND 2 Related
Operate & Maintain
Specialty areas
responsible for
providing support,
administration, and
maintenance necessary
to ensure effective and
efficient information
technology (IT) system
performance and
security.
Data Administration N/A
Knowledge Management N/A
Customer Service and
Technical Support
CND 3 Specialist
Network Services CND 3 Related
System Administration CND 3 Specialist
Systems Security Analysis CND 3 Specialist
CERTIFIED NETWORK DEFENDER
The Ultimate Certification for Network AdministratorsEC-Council
I/A Framework
Categories
I/A Framework Specialty
Areas
EC-Council
Certification
Estimated
Framework
Proficiency Level
Match (1-4)
C3 Relation
Category
Protect and Defend
Specialty areas
responsible for
identification, analysis,
and mitigation of
threats to internal
information
technology (IT)
systems or networks.
Computer Network
Defense (CND) Analysis
CEH 2 Related
Incident Response ECIH 3 Related
Computer Network
Defense (CND)
Infrastructure Support
CND 3 Specialist
Vulnerability Assessment
and Management
ECSA/LPT 3 Specialist
Investigate
Specialty areas
responsible for
investigation of cyber
events and/or
crimes of information
technology (IT)
systems, networks, and
digital evidence.
Investigation CHFI 4 Specialist
Digital Forensics CHFI 3 Specialist
Collect and Operate
Specialty areas
responsible for
specialized denial and
deception operations
and collection
of cybersecurity
information that may
be used to develop
intelligence.
Collection Operations ECSA/LPT 2 Related
Cyber Operations
Planning
CND 3 Specialist
Cyber Operations ECSA/LPT 3 Specialist
CERTIFIED NETWORK DEFENDER
The Ultimate Certification for Network AdministratorsEC-Council
I/A Framework
Categories
I/A Framework Specialty
Areas
EC-Council
Certification
Estimated
Framework
Proficiency Level
Match (1-4)
C3 Relation
Category
Analyze
Specialty areas
responsible for highly
specialized review
and evaluation of
incoming cybersecurity
information to
determine its
usefulness for
intelligence.
Threat Analysis ECSA/LPT 3 Specialist
Exploitation Analysis CHFI 3 Specialist
Targets ECSA/LPT 2 Related
All Source Intelligence ECSA/LPT 2 Related
Oversight and
Development
Specialty areas
providing leadership,
management,
direction, and/or
development and
advocacy so that
individuals and
organizations may
effectively conduct
cybersecurity work.
Legal Advice and Advocacy CCISO 3 Specialist
Education and Training CEI 3 Related
Strategic Planning and
Policy Development
CCISO 3 Specialist
Information Systems
Security Operations
(ISSO)
CCISO 4 Specialist
Security Program
Management (CISO)
CCISO 3 Related
EC-Council
www.eccouncil.org

More Related Content

PDF
Understanding the Event Log
chuckbt
 
PDF
Social Media Forensics
John J. Carney, Esq.
 
PPT
Best practises for log management
Brian Honan
 
PPTX
Seminar-Two Factor Authentication
Dilip Kr. Jangir
 
PPT
Lecture 8 mail security
rajakhurram
 
PPTX
Transport Layer Security (TLS)
Arun Shukla
 
PDF
Endpoint Detection & Response - FireEye
Prime Infoserv
 
PDF
Microsoft Windows 10 for the Enterprise
David J Rosenthal
 
Understanding the Event Log
chuckbt
 
Social Media Forensics
John J. Carney, Esq.
 
Best practises for log management
Brian Honan
 
Seminar-Two Factor Authentication
Dilip Kr. Jangir
 
Lecture 8 mail security
rajakhurram
 
Transport Layer Security (TLS)
Arun Shukla
 
Endpoint Detection & Response - FireEye
Prime Infoserv
 
Microsoft Windows 10 for the Enterprise
David J Rosenthal
 

What's hot (20)

PDF
KHNOG 3: DDoS Attack Prevention
APNIC
 
PPTX
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Ravikumar Sathyamurthy
 
PPTX
Introduction to Public Key Infrastructure
Theo Gravity
 
PPTX
Network security
Madhumithah Ilango
 
PDF
Introduction to MITRE ATT&CK
Arpan Raval
 
PPTX
Employee Security Awareness Training
Denis kisina
 
PPT
IT Security Awareness-v1.7.ppt
OoXair
 
PDF
Cybersecurity Essentials
CarmineCastaldoTucci
 
PPTX
Network forensic
Manjushree Mashal
 
PDF
Authentication techniques
IGZ Software house
 
PPTX
CS8792 - Cryptography and Network Security
vishnukp34
 
PPTX
Identity and access management
Piyush Jain
 
PPTX
Encryption algorithms
trilokchandra prakash
 
PPTX
Vulnerability assessment and penetration testing
Abu Sadat Mohammed Yasin
 
PPTX
Security Information and Event Management (SIEM)
k33a
 
PDF
Cyber Security Vulnerabilities
Siemplify
 
PDF
Public key Infrastructure (PKI)
Venkatesh Jambulingam
 
PPTX
Email security
Mohammed Hilal
 
PPTX
Introduction to penetration testing
Nezar Alazzabi
 
PDF
End-User Security Awareness
Surya Bathulapalli
 
KHNOG 3: DDoS Attack Prevention
APNIC
 
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Ravikumar Sathyamurthy
 
Introduction to Public Key Infrastructure
Theo Gravity
 
Network security
Madhumithah Ilango
 
Introduction to MITRE ATT&CK
Arpan Raval
 
Employee Security Awareness Training
Denis kisina
 
IT Security Awareness-v1.7.ppt
OoXair
 
Cybersecurity Essentials
CarmineCastaldoTucci
 
Network forensic
Manjushree Mashal
 
Authentication techniques
IGZ Software house
 
CS8792 - Cryptography and Network Security
vishnukp34
 
Identity and access management
Piyush Jain
 
Encryption algorithms
trilokchandra prakash
 
Vulnerability assessment and penetration testing
Abu Sadat Mohammed Yasin
 
Security Information and Event Management (SIEM)
k33a
 
Cyber Security Vulnerabilities
Siemplify
 
Public key Infrastructure (PKI)
Venkatesh Jambulingam
 
Email security
Mohammed Hilal
 
Introduction to penetration testing
Nezar Alazzabi
 
End-User Security Awareness
Surya Bathulapalli
 
Ad

Viewers also liked (14)

PDF
TH3 Professional Developper CEH social engineering
th3prodevelopper
 
PDF
TH3 Professional Developper CEH hacking email accounts
th3prodevelopper
 
PDF
TH3 Professional Developper CEH phishing
th3prodevelopper
 
PDF
TH3 Professional Developper CEH denial of service
th3prodevelopper
 
PDF
Top 6 things_small_businesses_q12015
anpapathanasiou
 
PPT
Peace: Conflict Well Done
Nancy Wright White
 
PPTX
Cyberbulling
Jose Lopez
 
PPTX
Bulling lia damaris2
upark4
 
PPTX
cyber bulling
Sadaf Walliyani
 
PPTX
Cyberbulling presentation
paulinariba
 
PPTX
Phising
teresamiraa
 
PDF
Cyber Bulling On School Grounds
kerr1va
 
PDF
Ce hv7 module 08 sniffers
Zuleima Parada
 
PPTX
Cybersecurity 1. intro to cybersecurity
sommerville-videos
 
TH3 Professional Developper CEH social engineering
th3prodevelopper
 
TH3 Professional Developper CEH hacking email accounts
th3prodevelopper
 
TH3 Professional Developper CEH phishing
th3prodevelopper
 
TH3 Professional Developper CEH denial of service
th3prodevelopper
 
Top 6 things_small_businesses_q12015
anpapathanasiou
 
Peace: Conflict Well Done
Nancy Wright White
 
Cyberbulling
Jose Lopez
 
Bulling lia damaris2
upark4
 
cyber bulling
Sadaf Walliyani
 
Cyberbulling presentation
paulinariba
 
Phising
teresamiraa
 
Cyber Bulling On School Grounds
kerr1va
 
Ce hv7 module 08 sniffers
Zuleima Parada
 
Cybersecurity 1. intro to cybersecurity
sommerville-videos
 
Ad

Similar to EC-Council Certified Network Defender (20)

PPTX
Skills that make network security training easy
EC-Council
 
PDF
The Ultimate EC Council Certification Handbook
Calvin Sam
 
PPTX
Cyber security course in Kerala , Kochi
amallblitz0
 
PPTX
All About Network Security & its Essentials.pptx
Infosectrain3
 
PDF
Secure Your Future in Tech with Network Security Training at UniNets
UniNets
 
PDF
Master the Art of Cyber Defense with Network Security Training at UniNets
UniNets
 
PDF
Datasheet
Carlos urrea
 
PDF
Securing Your Network with Innovative Technologies
Ahad
 
PPTX
Key Computer Security Certifications Offered by INTERCERT.pptx
INTERCERT
 
PDF
CISSP Certification Training Course
Ricky Lionel Vaz
 
PDF
Advantages and Disadvantages of Network Security.pdf
Careerera
 
PPTX
How to Get into Cybersecurity 2024 Action Plan.pptx
AkhilKumar529314
 
DOC
Network Security Essentials for IT Professionals.doc
TCCI Computer Coaching
 
PDF
Cyber_Services_2015_company_intro_ENG_v2p0
Ferenc Fresz
 
PPTX
Network Security version1.0 - Module 3.pptx
Infotainmentforall
 
PPTX
Network Security v1.0 - You have Module 3.pptx
roanmhammed
 
PPTX
Cybersecurity Training Seminars, 44 Courses : Tonex Training
Bryan Len
 
PPTX
Cybersecurity in Singapore: Trends, Careers & Training Path
AkhilKumar529314
 
PPTX
A-Software-Engineering-Framework-for-Enhancing-Cyber-Security-in-Network-Syst...
Hemavanth1
 
PDF
network security.pdf
JeganathanJayaran
 
Skills that make network security training easy
EC-Council
 
The Ultimate EC Council Certification Handbook
Calvin Sam
 
Cyber security course in Kerala , Kochi
amallblitz0
 
All About Network Security & its Essentials.pptx
Infosectrain3
 
Secure Your Future in Tech with Network Security Training at UniNets
UniNets
 
Master the Art of Cyber Defense with Network Security Training at UniNets
UniNets
 
Datasheet
Carlos urrea
 
Securing Your Network with Innovative Technologies
Ahad
 
Key Computer Security Certifications Offered by INTERCERT.pptx
INTERCERT
 
CISSP Certification Training Course
Ricky Lionel Vaz
 
Advantages and Disadvantages of Network Security.pdf
Careerera
 
How to Get into Cybersecurity 2024 Action Plan.pptx
AkhilKumar529314
 
Network Security Essentials for IT Professionals.doc
TCCI Computer Coaching
 
Cyber_Services_2015_company_intro_ENG_v2p0
Ferenc Fresz
 
Network Security version1.0 - Module 3.pptx
Infotainmentforall
 
Network Security v1.0 - You have Module 3.pptx
roanmhammed
 
Cybersecurity Training Seminars, 44 Courses : Tonex Training
Bryan Len
 
Cybersecurity in Singapore: Trends, Careers & Training Path
AkhilKumar529314
 
A-Software-Engineering-Framework-for-Enhancing-Cyber-Security-in-Network-Syst...
Hemavanth1
 
network security.pdf
JeganathanJayaran
 

More from ITpreneurs (20)

PDF
CCC-Internet of Things Foundation
ITpreneurs
 
PDF
TOGAF Portfolio from ITpreneurs
ITpreneurs
 
PPTX
How ITpreneurs enables training providers to offer quality DevOps training pr...
ITpreneurs
 
PPTX
The Sky Is The Limit (CCC)
ITpreneurs
 
PPTX
ITpreneurs’ DevOps Portfolio- Professionalizing DevOps Skills
ITpreneurs
 
PDF
EC-Council Computer Hacking Forensic Investigator v9
ITpreneurs
 
PPTX
Step by Step Guide
ITpreneurs
 
PPTX
Why SDN Skills is a Big Boost to Networking Careers
ITpreneurs
 
PDF
EC-Council Certified Security Analyst Program
ITpreneurs
 
PPTX
Enterprise Architecture Courseware by ITpreneurs
ITpreneurs
 
PDF
[Infographic] Top 10 Reasons Why You and Your IT Organization Should Adopt Ke...
ITpreneurs
 
PDF
[Infographic] Top 5 Reasons To Become a Licensed Kepner-Tregoe Foundation Tra...
ITpreneurs
 
PDF
[Infographic] How Simulations accelerate change management (5 stages).
ITpreneurs
 
PDF
EC-Council Certified Secure Computer User C|SCU Program
ITpreneurs
 
PDF
IT4IT™
ITpreneurs
 
PDF
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
ITpreneurs
 
PDF
EC-Council Cyber Security Training and Certifications
ITpreneurs
 
PDF
ITpreneurs Corporate Brochure
ITpreneurs
 
PPTX
10 Questions Any Training Business Should Answer - by ITpreneurs
ITpreneurs
 
PDF
PRINCE2®とPMBOK・ITIL®の比較
ITpreneurs
 
CCC-Internet of Things Foundation
ITpreneurs
 
TOGAF Portfolio from ITpreneurs
ITpreneurs
 
How ITpreneurs enables training providers to offer quality DevOps training pr...
ITpreneurs
 
The Sky Is The Limit (CCC)
ITpreneurs
 
ITpreneurs’ DevOps Portfolio- Professionalizing DevOps Skills
ITpreneurs
 
EC-Council Computer Hacking Forensic Investigator v9
ITpreneurs
 
Step by Step Guide
ITpreneurs
 
Why SDN Skills is a Big Boost to Networking Careers
ITpreneurs
 
EC-Council Certified Security Analyst Program
ITpreneurs
 
Enterprise Architecture Courseware by ITpreneurs
ITpreneurs
 
[Infographic] Top 10 Reasons Why You and Your IT Organization Should Adopt Ke...
ITpreneurs
 
[Infographic] Top 5 Reasons To Become a Licensed Kepner-Tregoe Foundation Tra...
ITpreneurs
 
[Infographic] How Simulations accelerate change management (5 stages).
ITpreneurs
 
EC-Council Certified Secure Computer User C|SCU Program
ITpreneurs
 
IT4IT™
ITpreneurs
 
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
ITpreneurs
 
EC-Council Cyber Security Training and Certifications
ITpreneurs
 
ITpreneurs Corporate Brochure
ITpreneurs
 
10 Questions Any Training Business Should Answer - by ITpreneurs
ITpreneurs
 
PRINCE2®とPMBOK・ITIL®の比較
ITpreneurs
 

Recently uploaded (20)

PPTX
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
PPTX
PREVENTIVE PEDIATRIC. pptx
AneetaSharma15
 
PPTX
IMMUNIZATION PROGRAMME pptx
AneetaSharma15
 
PDF
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
PPTX
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
PPTX
Presentation on Janskhiya sthirata kosh.
Ms Usha Vadhel
 
PPTX
Nursing Management of Patients with Disorders of Ear, Nose, and Throat (ENT) ...
RAKESH SAJJAN
 
PDF
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
PDF
Electricity-Magnetic-and-Heating-Effects 4th Chapter/8th-science-curiosity.pd...
Sandeep Swamy
 
PDF
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
PPTX
How to Manage Global Discount in Odoo 18 POS
Celine George
 
PPTX
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
PPTX
Software Engineering BSC DS UNIT 1 .pptx
Dr. Pallawi Bulakh
 
PDF
Phylum Arthropoda: Characteristics and Classification, Entomology Lecture
Miraj Khan
 
PPTX
vedic maths in python:unleasing ancient wisdom with modern code
mistrymuskan14
 
PPTX
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
PPTX
PPTs-The Rise of Empiresghhhhhhhh (1).pptx
academysrusti114
 
PPTX
Skill Development Program For Physiotherapy Students by SRY.pptx
Prof.Dr.Y.SHANTHOSHRAJA MPT Orthopedic., MSc Microbiology
 
PDF
Arihant Class 10 All in One Maths full pdf
sajal kumar
 
PPTX
Congenital Hypothyroidism pptx
AneetaSharma15
 
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
PREVENTIVE PEDIATRIC. pptx
AneetaSharma15
 
IMMUNIZATION PROGRAMME pptx
AneetaSharma15
 
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
Presentation on Janskhiya sthirata kosh.
Ms Usha Vadhel
 
Nursing Management of Patients with Disorders of Ear, Nose, and Throat (ENT) ...
RAKESH SAJJAN
 
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
Electricity-Magnetic-and-Heating-Effects 4th Chapter/8th-science-curiosity.pd...
Sandeep Swamy
 
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
How to Manage Global Discount in Odoo 18 POS
Celine George
 
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
Software Engineering BSC DS UNIT 1 .pptx
Dr. Pallawi Bulakh
 
Phylum Arthropoda: Characteristics and Classification, Entomology Lecture
Miraj Khan
 
vedic maths in python:unleasing ancient wisdom with modern code
mistrymuskan14
 
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
PPTs-The Rise of Empiresghhhhhhhh (1).pptx
academysrusti114
 
Skill Development Program For Physiotherapy Students by SRY.pptx
Prof.Dr.Y.SHANTHOSHRAJA MPT Orthopedic., MSc Microbiology
 
Arihant Class 10 All in One Maths full pdf
sajal kumar
 
Congenital Hypothyroidism pptx
AneetaSharma15
 

EC-Council Certified Network Defender

  • 1. CERTIFIED NETWORK DEFENDER The Ultimate Certification for Network AdministratorsEC-Council Certified DNetwork Defender NC THE ULTIMATE CERTIFICATION FOR NETWORK ADMINISTRATORS IF YOUR IT CREW IS NOT INTO SECURITY, YOU JUST WON’T HAVE SECURITY EC-Council PROTECT - DETECT - RESPOND. CERTIFIED NETWORK DEFENDER
  • 2. CERTIFIED NETWORK DEFENDER The Ultimate Certification for Network AdministratorsEC-Council Course Description Certified Network Defender (CND ) is a vendor-neutral, hands-on, instructor-led comprehensive network security certificationtrainingprogram.Itisaskills-based,labintensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and responsibilities and the Department of Defense (DoD) job roles for system/network administrators. The course is designed and developed after extensive market research and surveys. The program prepares network administrators on network security technologies and operations to attain Defense- in-Depth network security preparedness. It covers the protect, detect and respond approach to network security. The course contains hands-on labs, based on major network security tools and techniques which will provide network administrators real world expertise on current network security technologies and operations. The study-kit provides you with over 10 GB of network security best practices, assessments and protection tools. The kit also contains templates for various network policies and a large number of white papers for additional learning. Course Duration: 5 days Time: 9.00 AM to 5.00 PM CERTIFIED NETWORK DEFENDER The Ultimate Certification for Network AdministratorsEC-Council
  • 3. Exam details: CERTIFIED NETWORK DEFENDER The Ultimate Certification for Network AdministratorsEC-Council Exam title: Certified Network Defender (CND) Exam code: 312-38 Number of questions: 100 Duration: 4 Hours Availability: ECCExam Test Format: Interactive Multiple Choice Questions
  • 4. CERTIFIED NETWORK DEFENDER The Ultimate Certification for Network AdministratorsEC-Council What will you learn? CERTIFIED NETWORK DEFENDER The Ultimate Certification for Network AdministratorsEC-Council Student will learn about various network security controls, protocols, and devices Student will able to determine appropriate location for IDS/IPS sensors, tuning IDS for false positives and false negatives, and configurations to harden security through IDPS technologies Students will able to implement secure VPN implementation for their organization Student will able identify various threats to wireless network and learn how to mitigate them Student will able to monitor and conduct signature analysis to detect various types of attacks and policy violation activities. Student will able to perform risk assessment, vulnerability assessment/scanning through various scanning tools and generate detailed reports on it Student will able to identify the critical data, choose appropriate back up method, media and technique to perform successful backup of organization data on regular basis Student will able to provide first response to the network security incident and assist IRT team and forensics investigation team in dealing with an incident. Students will able to troubleshoot their network for various network problems Student will able identify various threats on organization network Student will learn how to design and implement various security policies for their organizations Studentwilllearntheimportanceofphysicalsecurity and able to determine and implement various physical security controls for their organizations Student will able to harden security of various hosts individually in the organization’s network Student will able to choose appropriate firewall solution, topology, and configurations to harden security through firewall
  • 5. CERTIFIED NETWORK DEFENDER The Ultimate Certification for Network AdministratorsEC-Council Organizational focus on cyber defense is more important than ever as cyber breaches have a far greater financial impact and can cause broad reputational damage. Despite best efforts to prevent breaches, many organizations are still being compromised. Therefore organizations must have, as part of their defense mechanisms, trained network engineers who are focused on protecting, detecting, and responding to the threats on their networks. Network administrators spends a lot of time with network environments, and are familiar with network components, traffic, performance and utilization, network topology, location of each system, security policy, etc. So, organizations can be much better in defending themselves from vicious attacks if the IT and network administrators equipped with adequate network security skills .Thus Network administrator can play a significant role in network defense and become first line of defense for any organizations. Why Certified Network Defender? “While there will be over 1.5 million cyber security jobs that remain unfilled by 2019, millions of IT and Networkadministratorsremainuntrainedonnetwork defense techniques” - Michael Brown, CEO at Symantec, the world’s largest security software vendor.
  • 6. CERTIFIED NETWORK DEFENDER The Ultimate Certification for Network AdministratorsEC-Council There is no proper tactical network security training that is made available for network administrators which provides them core network security skills. Students enrolled in the Certified Network Defender course, will gain a detailed understanding and hands on ability to function in real life situations involving network defense. They will gain the technical depth required to actively design a secure network in your organization.Thisprogramwillbeakintolearningmath instead of just using a calculator. This course gives you the fundamental understanding of the true construct of data transfer, network technologies, software technologies so that you understand how networks operate, understand what software is automating and how to analyze the subject material. You will learn how to protect, detect and respond to the network attacks. You will learn network defense fundamentals, the application of network security controls, protocols, perimeter appliances, secure IDS, VPN and firewall configuration. You will then learn the intricacies of network traffic signature, analysis and vulnerability scanning which will help you when you design greater network security policies and successful incident response plans. These skills will help you foster resiliency and continuity of operations during attacks. “Cyber Security is commonly the first thing on the minds of CIO but is, in many cases, an after thought for the IT department” - Jay Bavisi President, EC-Council
  • 7. CERTIFIED NETWORK DEFENDER The Ultimate Certification for Network AdministratorsEC-Council World's Biggest Data Breaches Research by Miriam Quick, Ella Hollowood, Christian Miles, Dan Hampson Source: http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
  • 8. What are the Domains of CND? CERTIFIED NETWORK DEFENDER The Ultimate Certification for Network AdministratorsEC-Council Module 01 Module 02 Module 03 Module 04 Module 05 Module 06 Module 07 Module 08 Module 09 Module 10 Module 11 Module 12 Module 13 Module 14 Network Security Controls, Protocols, and Devices Network Security Policy Design and Implementation Physical Security Host Security Secure Firewall Configuration and Management Secure VPN Configuration and Management Secure IDS Configuration and Management Wireless Network Defense Network Traffic Monitoring and Analysis Network Risk and Vulnerability Management Data Backup and Recovery Network Incident Response and Management Computer Network and Defense Fundamentals Network Security Threats, Vulnerabilities, and Attacks
  • 9. Who Is It For? Network Administrators Network Defense Technicians Anyone who involves in network operations Security Operator CND Analyst Network security Administrators Network Security Engineer Security Analyst CERTIFIED NETWORK DEFENDER The Ultimate Certification for Network AdministratorsEC-Council
  • 10. CERTIFIED NETWORK DEFENDER The Ultimate Certification for Network AdministratorsEC-Council What job roles would need the CND specific skills? MAPPING SUMMARY I/A Framework Categories I/A Framework Specialty Areas EC-Council Certification Estimated Framework Proficiency Level Match (1-4) C3 Relation Category Securely Provision Specialty areas responsible for conceptualizing, designing, and building secure information technology (IT) systems Information Assurance (IA) Compliance CND 2 Related Software Assurance and Security Engineering ECSP 2 Related Systems Security Architecture CND 3 Related Technology Research and Development CND 3 Related System Requirements Planning CND 2 Related Test and Evaluation CND 3 Related Systems Development CND 2 Related Operate & Maintain Specialty areas responsible for providing support, administration, and maintenance necessary to ensure effective and efficient information technology (IT) system performance and security. Data Administration N/A Knowledge Management N/A Customer Service and Technical Support CND 3 Specialist Network Services CND 3 Related System Administration CND 3 Specialist Systems Security Analysis CND 3 Specialist
  • 11. CERTIFIED NETWORK DEFENDER The Ultimate Certification for Network AdministratorsEC-Council I/A Framework Categories I/A Framework Specialty Areas EC-Council Certification Estimated Framework Proficiency Level Match (1-4) C3 Relation Category Protect and Defend Specialty areas responsible for identification, analysis, and mitigation of threats to internal information technology (IT) systems or networks. Computer Network Defense (CND) Analysis CEH 2 Related Incident Response ECIH 3 Related Computer Network Defense (CND) Infrastructure Support CND 3 Specialist Vulnerability Assessment and Management ECSA/LPT 3 Specialist Investigate Specialty areas responsible for investigation of cyber events and/or crimes of information technology (IT) systems, networks, and digital evidence. Investigation CHFI 4 Specialist Digital Forensics CHFI 3 Specialist Collect and Operate Specialty areas responsible for specialized denial and deception operations and collection of cybersecurity information that may be used to develop intelligence. Collection Operations ECSA/LPT 2 Related Cyber Operations Planning CND 3 Specialist Cyber Operations ECSA/LPT 3 Specialist
  • 12. CERTIFIED NETWORK DEFENDER The Ultimate Certification for Network AdministratorsEC-Council I/A Framework Categories I/A Framework Specialty Areas EC-Council Certification Estimated Framework Proficiency Level Match (1-4) C3 Relation Category Analyze Specialty areas responsible for highly specialized review and evaluation of incoming cybersecurity information to determine its usefulness for intelligence. Threat Analysis ECSA/LPT 3 Specialist Exploitation Analysis CHFI 3 Specialist Targets ECSA/LPT 2 Related All Source Intelligence ECSA/LPT 2 Related Oversight and Development Specialty areas providing leadership, management, direction, and/or development and advocacy so that individuals and organizations may effectively conduct cybersecurity work. Legal Advice and Advocacy CCISO 3 Specialist Education and Training CEI 3 Related Strategic Planning and Policy Development CCISO 3 Specialist Information Systems Security Operations (ISSO) CCISO 4 Specialist Security Program Management (CISO) CCISO 3 Related