Provided by

About the course

ttacks on networks and systems are constantly evolving, and new methods are developed with alarming regularity. Attackers develop and learn new and effective methods to evade traditional signature-based solutions such as firewalls. An effective method of combatting such attacks is required, and this often requires the “defender” to know how the “attacker” operates and the vulnerabilities they may attempt to take advantage of.

Developed to complement the existing Certified Ethical Hacker qualification, the Certified Network Defender programme is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and responsibilities and the US Department of Defense (DoD) job roles for system/network administrators. The course is designed and developed after extensive market research and surveys.

Designed in collaboration with industry, and the requirements of commercial and state organisations to meet the challenges posed in the rapidly evolving threat landscape, the C|ND certification is the perfect starting point for a variety of jobs role holders. The C|ND certification can be supplemented by the C|EH (Certified Ethical Hacker) programme.

Module 01: Computer Network and Defence Fundamentals.

Module 02: Network Security Threats, Vulnerabilities, and Attacks.

Module 03: Network Security Controls, Protocols, and Devices.

Module 04: Network Security Policy Design and Implementation.

Module 05: Physical Security.

Module 06: Host Security.

Module 07: Secure Firewall Configuration and Management.

Module 08: Secure IDS Configuration and Management.

Module 09: Secure VPN Configuration and Management.

Module 10: Wireless Network Defence.

Module 11: Network Traffic Monitoring and Analysis.

Module 12: Network Risk and Vulnerability Management.

Module 13: Data Backup and Recovery.

Module 14: Network Incident Response and Manageme

Related article

Adrian Adair, Operations Direction at Morson International , explains how the exponential growth of IT has transformed the cyber security industry ...