EC-Council Certified Network Defender v2 (CND)

Exam-ID:
CND 312-38
Seminar-ID:
CND

Important information

Dieses Training bereitet auf die Prüfung 312-38 CND Exam vor. Das Examen ist im Trainingspreis inkludiert. 
Testfragen: 100
Testdauer: 4 Stunden
Testform: Multiple Choice
Testanbieter: VUE bei ETC Wien oder Graz

Seminar content

Die Ausbildung zum „Certified Network Defender“ (CND) ist ein herstellerneutrales, praktisches und umfassendes Netzwerksicherheit-Zertifizierungsprogramm.

In diesem Labintensiven Training, das auf einer Analyse der Aufgabenanforderungen und Maßnahmen zur Internetsicherheit beruht, erlangen Sie alle Fertigkeiten, die Sie in puncto Cybersicherheit benötigen.

Das Training basiert auf den Anforderungen von System- und Netzwerkadministrator*innen des amerikanischen Verteidigungsministerium, wurde aber auch an globale Stellenanforderungen und Verantworlichkeiten ausgerichtet. Konzeption und Ausarbeitung des Kurses erfolgte anhand umfassender Marktforschungen und Umfragen.

Im Rahmen dieses Programms lernen Netzwerkadministrator*innen Technologien und Vorgänge zur Netzwerksicherheit kennen, die sie auf den Aufbau einer tiefgreifenden Schutzarchitektur für ihre Netzwerke vorbereiten. Dabei wird der Netzwerksicherheitsansatz „Schutz, Erkennung und Reaktion“ behandelt. Das Training umfasst praktische Übungen zu den wichtigsten Tools und Techniken zur Netzwerksicherheit. Anhand dieser Übungen erhalten Netzwerkadministrator*innen praktische Erfahrungen mit aktuellen Netzwerksicherheitstechnologien und -vorgängen.

Das umfassende Lernmaterial enthält bewährte Methoden, Bewertungen und Sicherheitstools zum Schutz von Netzwerken. Außerdem beinhaltet das Material Vorlagen für verschiedene Netzwerkrichtlinien sowie zahlreiche Whitepaper.

Nach Abschluss des Kurses haben die Teilnehmer Kenntnisse zu folgenden Themen:
  • Network Attacks and Defense Strategies
  • Administrative Network Security
  • Technical Network Security
  • Network Perimeter Security
  • Endpoint Security-Windows Systems
  • Endpoint Security-Linux Systems
  • Endpoint Security- Mobile Devices
  • Endpoint Security-IoT Devices
  • Administrative Application Security
  • Data Security
  • Enterprise Virtual Network Security
  • Enterprise Cloud Network Security
  • Enterprise Wireless Network Security
  • Network Traffic Monitoring and Analysis
  • Network Logs Monitoring and Analysis
  • Incident Response and Forensic Investigation
  • Business Continuity and Disaster Recovery
  • Risk Anticipation with Risk Management
  • Threat Assessment with Attack Surface Analysis
  • Threat Prediction with Cyber Threat Intelligence

Target audience

  • Network Administrator*innen
  • Network security Administrator*innen
  • Network Security Engineer*innen
  • Network Defense Technicians
  • CND Analyst
  • Security Analyst*innen
  • Security Operator*innen
  • Jeder, der mit Netzbetrieb zu tun hat

Prior knowledge

Grundlegende Kenntnisse von Netzwerkkonzepten. 

Detailed content

Module 01: Network Attacks and Defense Strategies
  • Network security attacks
  • Network-level attack techniques
  • Application-level attack techniques
  • Social engineering attack techniques
  • Email attack techniques
  • Mobile device-specific attack techniques
  • Cloud-specific attack techniques
  • Wireless network-specific attack techniques
  • Attacker’s Hacking Methodologies and Frameworks
  • Fundamental goal, benefits, and challenges in network defense
  • Continual/Adaptive security strategy
  • Defense-in-depth security strategy

Module 02: Administrative Network Security
  • Obtain compliance with regulatory framework and standards
  • Regulatory Frameworks, Laws, and Acts
  • Design and develop security policies
  • Conduct different type security and awareness training
  • Implement other administrative security measures

Module 03: Technical Network Security
  • Access control principles, terminologies, and models
  • Redefine the Access Control in Today’s Distributed and Mobile Computing World
  • Identity and Access Management (IAM):
  • Cryptographic security techniques
  • Various cryptographic algorithms
  • Security benefits of network segmentation techniques
  • Essential network security solutions
  • Essential network security protocols

Module 04: Network Perimeter Security
  • Firewall security concerns, capabilities, and limitations
  • Different types of firewall technologies and their usage
  • Firewall topologies and their usage
  • Distinguish between hardware, software, host, network, internal, and external firewalls
  • Select firewalls based on its deep traffic inspection capability
  • Firewall implementation and deployment process
  • Recommendations and best practices for secure firewall Implementation and deployment
  • Firewall administration concepts
  • Role, capabilities, limitations, and concerns in IDS deployment
  • IDS classification
  • Various components of ID
  • Effective deployment of network and host-based IDS
  • How to deal with false positive and false negative IDS/IPS alerts
  • Considerations for selection of an appropriate IDS/IPS solutions
  • NIDS and HIDS Solutions with their intrusion detection capabilities Snort
  • Router and switch security measures, recommendations, and best practices
  • Leverage Zero Trust Model Security using Software-Defined Perimeter (SDP)

Module 05: Endpoint Security-Windows Systems
  • Window OS and Security Concerns
  • Windows Security Components
  • Windows Security Features
  • Windows Security Baseline Configurations
  • Windows User Account and Password Management
  • Windows Patch Management
  • User Access Management
  • Windows OS Security Hardening Techniques
  • Windows Active Directory Security Best Practices
  • Windows Network Services and Protocol Security

Module 06: Endpoint Security-Linux Systems LO#01: Linux OS and security concerns
  • Linux Installation and Patching
  • Linux OS Hardening Techniques
  • Linux User Access and Password Management
  • Linux Network Security and Remote Access
  • Linux Security Tools and Frameworks

Module 07: Endpoint Security- Mobile Devices
  • Common Mobile Usage Policies in Enterprises
  • Security Risk and Guidelines associated with Enterprises mobile usage policies
  • Implement various enterprise-level mobile security management Solutions
  • Implement general security guidelines and best practices on Mobile platforms
  • Security guidelines and tools for Android devices
  • Security guidelines and tools for iOS devices

Module 08: Endpoint Security-IoT Devices
  • IoT Devices, their need and Application Areas
  • IoT Ecosystem and Communication models
  • Security Challenges and risks associated with IoT-enabled environments
  • Security in IoT-enabled environments
  • Security Measures for IoT enabled IT Environments
  • IoT Security Tools and Best Practices
  • Refer various standards, Initiatives and Efforts for IoT Security

Module 09: Administrative Application Security
  • Implement Application Whitelisting and Blacklisting
  • Implement application Sandboxing
  • Implement Application Patch Management
  • Implement Web Application Firewall (WAF)

Module 10: Data Security
  • Data security and its importance
  • Implementation of data access controls
  • Implementation of Encryption of Data at rest
  • Implementation of Encryption of “Data at transit”
  • Implementation of Encryption of “Data at transit” between browser and web server
  • Implementation of Encryption of “Data at transit” between database server and web server
  • Implementation of Encryption of “Data at transit” in Email Delivery
  • Data Masking Concepts
  • Data backup and retention
  • Data Destruction Concepts
  • Data Loss Prevention Concepts

Module 11: Enterprise Virtual Netw