Course Details

Your Growth, Our Mission

EC-COUNCIL CERTIFIED NETWORK DEFENDER
Course Description
Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and responsibilities and the Department of Defense (DOD) job roles for system/network administrators. The course is designed and developed after extensive market research and surveys

The program prepares network administrators on network security technologies and operations to attain Defense-in-Depth network security preparedness. It covers the protect, detect and respond approach to network security. The course contains hands-on labs, based on major network security tools and techniques which will provide network administrators real world expertise on current network security technologies and operations. The study-kit provides you with over 10 GB of network security best practices, assessments and protection tools. The kit also contains templates for various network policies and a large number of white papers for additional learning.

  1. Network Administrators
  2. Network security Administrators
  3. Network Security Engineer
  4. Network Defense Technicians
  5. CND Analyst
  6. Security Analyst
  7. Security Operator
  8. Anyone who involves in network operations

Module 01: Computer Network and Defense Fundamentals

Network Fundamentals

Computer Network

Types of Network

Major Network Topologies

Network Components

Network Interface Card (NIC)

Repeater

Hub

Switches

Router

Bridges

Gateways

TCP/IP Networking Basics

Standard Network Models: OSI Model

Standard Network Models: TCP/IP Model

Comparing OSI and TCP/IP

TCP/IP Protocol Stack

Domain Name System (DNS)

DNS Packet Format

Transmission Control Protocol (TCP)

TCP Header Format

TCP Services

TCP Operation

Three-way hand shake

User Datagram Protocol (UDP)

UDP Operation

IP Header

IP Header: Protocol Field

What is Internet Protocol v6 (IPv6)?

IPv6 Header

Internet Control Message Protocol (ICMP)

Format of an ICMP Message

Address Resolution Protocol (ARP)

ARP Packet Format

Fiber Distributed Data Interface (FDDI)

Token Ring

IP Addressing

Classful IP Addressing

Address Classes

Reserved IP Address

Subnet Masking

Subnetting

Supernetting

IPv6 Addressing

Difference between IPv4 and IPv6

IPv4 compatible IPv6 Address

Computer Network Defense (CND)

Computer Fundamental Attributes

What CND is NOT

CND Layers

CND Layer 1: Technologies

CND Layer 2: Operations

CND Layer 3: People

Blue Teaming

Network Defense-In-Depth

Typical Secure Network Design

CND Triad

CND Process

CND Actions

CND Approaches

Module 02: Network Security Threats, Vulnerabilities, and Attacks

Essential Terminologies

Threats

Vulnerabilities

Attacks

Network Security Concerns

Why Network Security Concern Arises?

Fundamental Network Security Threats

Types of Network Security Threats

How does network security breach affects business continuity?

Network Security Vulnerabilities

Types of Network Security Vulnerabilities

Technological Vulnerabilities

Configuration Vulnerabilities

Security policy Vulnerabilities

Types of Network Security Attacks

Network Reconnaissance Attacks

Reconnaissance Attacks

Reconnaissance Attacks: ICMP Scanning

Reconnaissance Attacks: Ping Sweep

Reconnaissance Attacks: DNS Foot printing

Reconnaissance Attacks: Network Range Discovery

Reconnaissance Attacks: Network Topology Identification

Reconnaissance Attacks: Network Information Extraction using N map Scan

Reconnaissance Attacks: Port Scanning

Reconnaissance Attacks: Network Sniffing

How an Attacker Hacks the Network Using Sniffers

Reconnaissance Attacks: Social Engineering Attacks

Network Access Attacks

Password Attacks

Password Attack Techniques

Dictionary Attack

Brute Forcing Attacks

Hybrid Attack

Birthday Attack

Rainbow Table Attack

Man-in-the-Middle Attack

Replay Attack

Smurf Attack

Spam and Spim

Xmas Attack

Pharming

Privilege Escalation

DNS Poisoning

ARP Poisoning

DHCP Attacks: DHCP Starvation Attacks

DHCP Attacks: DHCP Spoofing Attack

Switch Port Stealing

Spoofing Attacks

MAC Spoofing/Duplicating

Denial of Service (DoS) Attacks

Distributed Denial-of-Service Attack (DDoS)

Malware Attacks

Malware

Types of Malware: Trojan

Types of Malware: Virus and Armored Virus

Malware Attacks

Adware

Spyware

Rootkits

Backdoors

Logic Bomb

Botnets

Ransomware

Polymorphic malware

Module 03: Network Security Controls, Protocols, and Devices

Fundamental Elements of Network Security

Network Security Controls

Network Security Protocols

Network Security Perimeter Appliances

Network Security Controls

Access Control

Access Control Terminology

Access Control Principles

Access Control System: Administrative Access Control

Access Control System: Physical Access Controls

Access Control System: Technical Access Controls

Types of Access Control

Discretionary Access Control (DAC)

Role-based Access

Network Access Control (NAC)

NAC Solutions

User Identification, Authentication, Authorization and Accounting

Types of Authentication: Password Authentication

Types of Authentication: Two-factor Authentication

Types of Authentication: Biometrics

Types of Authentication: Smart Card Authentication

Types of Authentication: Single Sign-on (SSO)

Types of Authorization Systems

Centralized Authorization

Implicit Authorization

Decentralized Authorization

Explicit Authorization

Authorization Principles

Least privilege

Separation of duties

Cryptography

Encryption

Symmetric Encryption

Asymmetric Encryption

Hashing: Data Integrity

Digital Signatures

Digital Certificates

Public Key Infrastructure (PKI)

Security Policy

Network Security Policy

Key Consideration for Network Security Policy

Types of Network Security Policies

Network Security Devices

Firewalls

DMZ

Virtual Private Network (VPN)

Proxy Server

Advantages of using Proxy Servers

Honeypot

Advantages of using Honeypots

Honeypot Tools

Intrusion Detection System (IDS)

Intrusion Prevention System (IPS)

IDS/IPS Solutions

Network Protocol Analyzer

How it Works

Advantages of using Network Protocol Analyzer

Network Protocol Analyzer Tools

Internet Content Filter

Advantages of using Internet Content Filters

Internet Content Filters

Integrated Network Security Hardware

Network Security Protocols

Transport Layer

Network Layer

Application Layer

Data Link Layer

RADIUS

TACACS+

Kerbros

Pretty Good Service (PGP) Protocol

S/MIME Protocol

How it Works

Difference between PGP and S/MIME

Secure HTTP

Hyper Text Transfer Protocol Secure (HTTPS)

Transport Layer Security (TLS)

Internet Protocol Security (IPsec)

Module 04: Network Security Policy Design and Implementation

What is Security Policy?

Hierarchy of Security Policy

Characteristics of a Good Security Policy

Contents of Security Policy

Policy Statements

Steps to Create and Implement Security Policies

Considerations before Designing a Security Policy

Design of Security Policy

Policy Implementation Checklist

Types of Information Security Policy

Enterprise information security policy (EISP

Issue specific security policy (ISSP)

System specific security policy (SSSP)

Internet Access Policies

Promiscuous Policy

Permissive Policy

Paranoid Policy

Prudent Policy

Acceptabl

Request Info

Course Rounds

5 Days
Code Date Venue Fees Action

Prices don't include VAT

Related Courses

Your Growth, Our Mission

Contact Us

Contact us to meet all your inquiries and needs, as our professional team is pleased to provide immediate support and advice to ensure you achieve your goals and facilitate your experience with us in the best possible way.

UAE
1st floor, Incubator Building, Masdar City, Abu Dhabi, UAE
Office
00971-2-6446633
Mobile
00971-50-5419377
E-mail
info@btsconsultant.com
Working Hours
Sun to Fri 09:00 AM to 06:00 PM