EC-Council Certified
Network Defender (CND)

Overview

The CND certification aims to equip you with hands-on training to function in real life situations involving network defense. You will gain the technical skills required to proactively design a secure network with future threats in mind. This program will be taking to learning math instead of just using a calculator. This program teaches a fundamental understanding of the true construct of data transfer, network technologies, and software technologies so that you understand how network operate, the process software is automating, and how to analyze the subject material.

Course Objective

You will learn the following skills on:
• Mitigate, harden, and defend from the attacks.
• Network defense fundamentals
• The application of network security controls
• Protocols
• Perimeter appliances
• Secure IDS
• VPN, and firewall configuration
• The intricacies of network traffic signature
• Analysis and vulnerability scanning
These skills will help you when you design grater network security policies and successful
incident response plans. They will also help you foster resiliency and continuity of operations
during attacks.

Who Should Attend

This course is intended for the following professionals:
• System Administrators
• System Engineers
• Firewall Administrators
• Network Managers
• IT Managers
• IT Professionals
• Anyone interested in network security technologies
• Managers who want to understand cyber security core principles and practices
• Operations personnel, who although do not have security as their primary job function,
need an understanding of cyber security core principles and practices.

Prerequisites

Participants should have a basic understanding of networking concepts and some experience in IT or cybersecurity. Prior knowledge of system administration and network management is beneficial but not required.

Prerequisites for the EC-Council Certified Encryption Specialist (ECES) course:
Participants should have at least one year of experience in the Information Security domain and a foundational understanding of security practices, including basic knowledge of cryptography, networking, and systems administration.

Analyzing Data with MS Excel

Training Calendar

Intake

Duration

Program Fees

Inquire further

5 Days

Contact us to find out more

Module

• Network Fundamentals
• Network Components
• TCP/IP Networking Basics
• TCP/IP Protocol Basics
• IP Addressing
• Computer Network Defense (CND)
• CND Triad CND Process
• CND Actions
• CND Approaches

• Essential Terminologies
• Network Security Concerns
• Network Security Vulnerabilities
• Network Reconnaissance Attacks
• Network Access Attacks
• Denial of Service (DoS) Attacks
• Distributed Denial-of-Attack (DDoS)
• Malware Attacks

• Fundamentals Elements of Network Security
• Network Security Controls
• User Identification, Authentication, Authorization and Accounting
• Types of Authorization Systems
• Authorization Principles
• Cryptography
• Security Policy
• Network Security Devices
• Network Protocols

• What is Security Policy?
• Internet Access Policies
• Acceptable-Use Policy
• User-Account Policy
• Remote-Access Policy
• Information-Protection Policy
• Firewall-Management Policy
• Special-Access Policy
• Network-Connection Policy
• Business-Partner Policy
• Email Security Policy
• Passwords Policy
• Physical Security Policy
• Information System Security Policy
• Bring Your Own Devices (BYOD) Policy
• Software/Application Security Policy
• Data Backup Policy
• Confidential Data Policy
• Data Classification Policy
• Internet Usage Policies
• Server Policy
• Wireless Network Policy
• Incidence Response Plan (IRP)
• User Access Control Policy
• Switch Security Policy
• Personal Device Usage Policy
• Encryption Policy
• Router Policy
• Intrusion Detection and Prevention (IDS/IPS) Policy
• Security Policy Training and Awareness
• ISO Information Security Standards
• Payment Card Industry Data Security Standard (PCI-DSS)
• Health Insurance Portability and Accountability Act (HIPAA)
• Information Security Acts: Sarbanes Oxley Act (SOX)
• Information Security Acts: Gramm-Leach-Bliley Act (GLBA)
• Information Security Acts: The Digital Millennium Copyright Act
• (DMCA) and Federal Information Security Management Act (FISMA)
• Other Information Security Acts and Laws

 

• Physical Security
• Access Control Authentication Techniques
• Physical Security Controls
• Other Physical Security Measures
• Workplace Security
• Laptop Security Tool: EXO5
• Environmental Controls
• Personnel Security: Managing Sta Hiring and Leaving Process
• Physical Security: Awareness/Training
• Physical Checklists

• Host Security
• OS Security
• Linux Security
• Securing Network Servers
• Hardening Routers and Switches
• Application/software Securit


• Firewalls and Concerns
• What Firewalls Does?
• What should you not ignore?: Firewall Limitations
• How Does a Firewall Work?
• Firewall Rules
• Types of Firewalls
• Firewall Technologies
• Firewall Topologies
• Firewall Rule Set & Policies
• Firewall Implementation
• Firewall Administration
• Firewall Logging and Auditing
• Firewall Anti-evasion Techniques
• Why Firewalls are Bypassed?
• Full Data Traffic Normalization
• Data Stream-based Inspection
• Vulnerability-based Detection and Blocking
• Firewall Security Recommendations and Best Practices
• Firewall Security Auditing Tools


• Intrusions and IDPS
• IDS
• Types of IDS Implementation
• IDS Deployment Strategies
• Types of IDS Alerts
• IPS
• IDPS Product Selection Considerations
• IDS Counterparts


• Understanding Virtual Private Network (VPN)
• How VPN works?
• Why to Establish VPN?
• VPN Components
• VPN Concentrators
• Types of VPN
• VPN Categories
• Selecting Appropriate VPN
• VPN Core Functions
• VPN Technologies
• VPN Topologies
• Common VPN Flaws
• VPN Security
• Quality Of Service and Performance in VPNs


• Wireless Terminologies
• Wireless Networks
• Wireless Standard
• Wireless Topologies
• Typical Use of Wireless Networks
• Components of Wireless Network
• WEP (Wired Equivalent Privacy) Encryption
• WPA (Wi-Fi Protected Access) Encryption
• WPA2 Encryption
• WEP vs. WPA vs. WPA2
• Wi-Fi Authentication Method
• Wi-Fi Authentication Process Using a Centralized Authentication
Server
• Wireless Network Threats
• Bluetooth Threats
• Wireless Network Security


• What is Risk?
• Risk Levels
• Risk Matrix
• Key Risk Indicators (KRI)
• Risk Management Phase
• Enterprise Network Risk Management
• Vulnerability Management


• Introduction to Data Backup
• RAID (Redundant Array of Independent Disks) Technology
• Storage Area Network (SAN)
• Network Attached Storage (NAS)
• Selecting Appropriate Backup Method
• Choosing the Right Location for Backup
• Backup Types
• Conducting Recovery Drill Test
• Data Recovery
• Windows Data Recovery Tool
• RAID Data Recovery Services
• SAN Data Recovery Software
• NAS Data Recovery Services


• Incident Handling and Response
• Incident Response Team Members: Roles and Responsibilities
• First Responder
• Incident Handling and Response Process
• Overview of IH&R Process Flow

FAQs

What is the EC-Council Certified Network Defender (CND) course about?
The CND course provides hands-on training in network defense, equipping you with the skills to proactively secure networks against current and future threats. It builds foundational knowledge of data transfer, network technologies, and software systems to help you understand how networks operate and how to secure them.

Who should attend this course?
This course is ideal for system administrators, system engineers, firewall administrators, network managers, IT managers, and professionals interested in network security. It’s also suitable for managers and operations personnel who need to understand core cybersecurity principles and practices.

What are the prerequisites for this course?
There are no strict prerequisites, but having basic knowledge of networking concepts and some experience in IT or cybersecurity will help participants get the most out of the training.

How long is the course?
The course runs for 5 days, totaling 35 hours of instructor-led or remote online training.

What key topics are covered in this course?
Key topics include network defense fundamentals, threat and vulnerability analysis, network security controls and devices, firewall and IDS/IPS configuration, VPN setup, wireless network defense, physical and host security, risk and vulnerability management, data backup and recovery, and incident response planning.

Will I receive a certification after completing the course?
Yes. After completing the training and passing the certification exam, you will receive the EC-Council Certified Network Defender (CND) certification, validating your ability to protect and defend network infrastructures.

What is the EC-Council Certified Encryption Specialist (ECES) course about?
The ECES course provides in-depth training in modern cryptography, focusing on symmetric and asymmetric encryption, hashing, steganography, and cryptanalysis. You’ll explore encryption standards, key cryptographic algorithms, and hands-on implementation techniques like VPN setup, disk encryption, and error detection in cryptographic systems.

Who should attend this course?
This course is ideal for ethical hackers, penetration testers, cryptanalysts, and cybersecurity professionals who want to strengthen their skills in encryption technologies and cryptographic fundamentals.

What are the prerequisites for this course?
Participants should have at least one year of experience in information security and a basic understanding of security practices and network fundamentals.

How long is the course?
The course spans 3 days of training.

What key topics are covered in this course?
Topics include the history and fundamentals of cryptography, symmetric and asymmetric encryption (AES, DES, RSA, ECC), hashing algorithms (MD5, SHA, RIPEMD), digital signatures, certificates, VPNs, BitLocker, steganography techniques, and cryptanalysis methods such as frequency analysis and chosen-plaintext attacks.

Will I learn about real-world encryption practices?
Yes. The course features practical exercises in file and disk encryption, certificate management, VPN setup, and using tools like CrypTool and VeraCrypt for real-world scenarios.

Will I receive a certification after completing the course?
Yes. Upon successful completion of the course and exam, you will earn the EC-Council Certified Encryption Specialist (ECES) certification.

Submit your interest today !

Contact us