EC-Council Certified Network Defender v2 (CND)

Exam-ID:
CND 312-38
Seminar-ID:
CND

Important information

Dieses Seminar bereitet auf die Prüfung 312-38 CND Exam vor. Das Examen ist im Kurspreis inkludiert.
Testfragen: 100
Testdauer: 4 Stunden
Testform: Multiple Choice
Testanbieter: EC-Council. 

Seminar content

Die Ausbildung zum „Certified Network Defender“ (CND) ist ein herstellerneutrales, praktisches und umfassendes Netzwerksicherheit-Zertifizierungsprogramm.

In diesem Labintensiven Seminar, das auf einer Analyse der Aufgabenanforderungen und Maßnahmen zur Internetsicherheit beruht, erlangen Sie alle Fertigkeiten, die Sie in puncto Cybersicherheit benötigen.

Der Kurs basiert auf den Anforderungen von System- und Netzwerkadministrator*innen des amerikanischen Verteidigungsministerium, wurde aber auch an globale Stellenanforderungen und Verantworlichkeiten ausgerichtet. Konzeption und Ausarbeitung des Kurses erfolgte anhand umfassender Marktforschungen und Umfragen.

Im Rahmen dieses Programms lernen Netzwerkadministrator*innen Technologien und Vorgänge zur Netzwerksicherheit kennen, die sie auf den Aufbau einer tiefgreifenden Schutzarchitektur für ihre Netzwerke vorbereiten. Dabei wird der Netzwerksicherheitsansatz „Schutz, Erkennung und Reaktion“ behandelt. Der Kurs umfasst praktische Übungen zu den wichtigsten Tools und Techniken zur Netzwerksicherheit. Anhand dieser Übungen erhalten Netzwerkadministrator*innen praktische Erfahrungen mit aktuellen Netzwerksicherheitstechnologien und -vorgängen.

Das umfassende Lernmaterial enthält bewährte Methoden, Bewertungen und Sicherheitstools zum Schutz von Netzwerken. Außerdem beinhaltet das Material Vorlagen für verschiedene Netzwerkrichtlinien sowie zahlreiche Whitepaper.

Nach Abschluss des Kurses haben die Teilnehmer Kenntnisse zu folgenden Themen:
  • Network Attacks and Defense Strategies
  • Administrative Network Security
  • Technical Network Security
  • Network Perimeter Security
  • Endpoint Security-Windows Systems
  • Endpoint Security-Linux Systems
  • Endpoint Security- Mobile Devices
  • Endpoint Security-IoT Devices
  • Administrative Application Security
  • Data Security
  • Enterprise Virtual Network Security
  • Enterprise Cloud Network Security
  • Enterprise Wireless Network Security
  • Network Traffic Monitoring and Analysis
  • Network Logs Monitoring and Analysis
  • Incident Response and Forensic Investigation
  • Business Continuity and Disaster Recovery
  • Risk Anticipation with Risk Management
  • Threat Assessment with Attack Surface Analysis
  • Threat Prediction with Cyber Threat Intelligence

Target audience

  • Network Administrator*innen
  • Network security Administrator*innen
  • Network Security Engineer*innen
  • Network Defense Technicians
  • CND Analyst
  • Security Analyst*innen
  • Security Operator*innen
  • Jeder, der mit Netzbetrieb zu tun hat

Prior knowledge

Grundlegende Kenntnisse von Netzwerkkonzepten. 

Detailed content

Module 01: Network Attacks and Defense Strategies
  • Network security attacks
  • Network-level attack techniques
  • Application-level attack techniques
  • Social engineering attack techniques
  • Email attack techniques
  • Mobile device-specific attack techniques
  • Cloud-specific attack techniques
  • Wireless network-specific attack techniques
  • Attacker’s Hacking Methodologies and Frameworks
  • Fundamental goal, benefits, and challenges in network defense
  • Continual/Adaptive security strategy
  • Defense-in-depth security strategy

Module 02: Administrative Network Security
  • Obtain compliance with regulatory framework and standards
  • Regulatory Frameworks, Laws, and Acts
  • Design and develop security policies
  • Conduct different type security and awareness training
  • Implement other administrative security measures

Module 03: Technical Network Security
  • Access control principles, terminologies, and models
  • Redefine the Access Control in Today’s Distributed and Mobile Computing World
  • Identity and Access Management (IAM):
  • Cryptographic security techniques
  • Various cryptographic algorithms
  • Security benefits of network segmentation techniques
  • Essential network security solutions
  • Essential network security protocols

Module 04: Network Perimeter Security
  • Firewall security concerns, capabilities, and limitations
  • Different types of firewall technologies and their usage
  • Firewall topologies and their usage
  • Distinguish between hardware, software, host, network, internal, and external firewalls
  • Select firewalls based on its deep traffic inspection capability
  • Firewall implementation and deployment process
  • Recommendations and best practices for secure firewall Implementation and deployment
  • Firewall administration concepts
  • Role, capabilities, limitations, and concerns in IDS deployment
  • IDS classification
  • Various components of ID
  • Effective deployment of network and host-based IDS
  • How to deal with false positive and false negative IDS/IPS alerts
  • Considerations for selection of an appropriate IDS/IPS solutions
  • NIDS and HIDS Solutions with their intrusion detection capabilities Snort
  • Router and switch security measures, recommendations, and best practices
  • Leverage Zero Trust Model Security using Software-Defined Perimeter (SDP)

Module 05: Endpoint Security-Windows Systems
  • Window OS and Security Concerns
  • Windows Security Components
  • Windows Security Features
  • Windows Security Baseline Configurations
  • Windows User Account and Password Management
  • Windows Patch Management
  • User Access Management
  • Windows OS Security Hardening Techniques
  • Windows Active Directory Security Best Practices
  • Windows Network Services and Protocol Security

Module 06: Endpoint Security-Linux Systems LO#01: Linux OS and security concerns
  • Linux Installation and Patching
  • Linux OS Hardening Techniques
  • Linux User Access and Password Management
  • Linux Network Security and Remote Access
  • Linux Security Tools and Frameworks

Module 07: Endpoint Security- Mobile Devices
  • Common Mobile Usage Policies in Enterprises
  • Security Risk and Guidelines associated with Enterprises mobile usage policies
  • Implement various enterprise-level mobile security management Solutions
  • Implement general security guidelines and best practices on Mobile platforms
  • Security guidelines and tools for Android devices
  • Security guidelines and tools for iOS devices

Module 08: Endpoint Security-IoT Devices
  • IoT Devices, their need and Application Areas
  • IoT Ecosystem and Communication models
  • Security Challenges and risks associated with IoT-enabled environments
  • Security in IoT-enabled environments
  • Security Measures for IoT enabled IT Environments
  • IoT Security Tools and Best Practices
  • Refer various standards, Initiatives and Efforts for IoT Security

Module 09: Administrative Application Security
  • Implement Application Whitelisting and Blacklisting
  • Implement application Sandboxing
  • Implement Application Patch Management
  • Implement Web Application Firewall (WAF)

Module 10: Data Security
  • Data security and its importance
  • Implementation of data access controls
  • Implementation of Encryption of Data at rest
  • Implementation of Encryption of “Data at transit”
  • Implementation of Encryption of “Data at transit” between browser and web server
  • Implementation of Encryption of “Data at transit” between database server and web server
  • Implementation of Encryption of “Data at transit” in Email Delivery
  • Data Masking Concepts
  • Data backup and retention
  • Data Destruction Concepts
  • Data Loss Prevention Concepts

Module 11: Enterprise Virtual Network Security
  • Evolution of network and security management concept in modern Virtualized IT Environments
  • Virtualization Essential Concepts
  • Network Virtualization (NV) Security
  • SDN Security
  • Network Function Virtualization (NFV) Security
  • OS Virtualization Security
  • Security Guidelines, Recommendations and Best Practices for Containers
  • Security Guidelines, Recommendations and Best practices for Dockers
  • Security Guidelines, Recommendations and Best Practices for Kubernetes

Module 12: Enterprise Cloud Security
  • Cloud Computing Fundamentals
  • Insights of Cloud Security
  • Evaluate CSP for Security before Consuming Cloud Service
  • Security in Amazon Cloud (AWS)
  • Security in Microsoft Azure Cloud
  • Security in Google Cloud Platform (GCP)
  • General security best practices and tools for cloud security

Module 13: Wireless Network Security
  • Wireless network fundamentals

Module 14: Network Traffic Monitoring and Analysis
  • Need and advantages of network traffic monitoring
  • Setting up the environment for network monitoring
  • Determine baseline traffic signatures for normal and suspicious network traffic
  • Perform network monitoring and analysis for suspicious traffic using Wireshark
  • Network performance and bandwidth monitoring tools and techniques

Module 15: Network Logs Monitoring and Analysis
  • Logging concepts
  • Log monitoring and analysis on Windows systems
  • Log monitoring and analysis on Linux
  • Log monitoring and analysis on Mac
  • Log monitoring and analysis in Firewall
  • Log monitoring and analysis on Routers
  •  Log monitoring and analysis on Web Servers
  • Centralized log monitoring and analysis

Module 16: Incident Response and Forensic Investigation
  • Incident response concept
  • Role of first responder in incident response
  • Do’s and Don’t in first response
  • Incident handling and response process
  • Forensics investigation process

Module 17: Business Continuity and Disaster Recovery
  • Business Continuity (BC) and Disaster Recovery (DR) concepts
  • BC/DR Activities
  • Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP)
  • BC/DR Standards

Module 18: Risk Anticipation with Risk Management
  • Risk management concepts
  • Manage risk though risk management program
  • Different Risk Management Frameworks (RMF)
  • Manage vulnerabilities through vulnerability management program
  • Vulnerability Assessment and Scanning

Module 19: Threat Assessment with Attack Surface Analysis
  • Attack surface concepts
  • Understand and visualize your attack surface
  • Identify Indicators of Exposures (IoE)
  • Perform attack simulation
  • Reduce the attack surface
  • Attack surface analysis specific to Cloud and IoT

Module 20: Threat Prediction with Cyber Threat Intelligence
  • Role of cyber threat intelligence in network defense
  • Types of threat Intelligence
  • Indicators of Threat Intelligence: Indicators of Compromise (IoCs) and Indicators of Attack (IoA)
  • Layers of Threat Intelligence
  • Leverage/consume threat intelligence for proactive defense

Downloads

Jetzt online buchen

  • 12.06.-16.06.2023 12.06.2023 5 days 5T Wien Online
    • Classroom Training 3.995,-
      • Your seminar
      • Seminar documents, teamwork, labs
      • Food & drinks on site
      • Seminar services
      Examen ist im Preis inkludiert
    • Online Training 3.995,-
      • Virtual training – live in the seminar
      • You don’t have to travel to the seminar centre
      • Seminar document, teamwork, labs 24/7
      • ETC>Live support and hotline
      • ETC services
      Examen ist im Preis inkludiert
  • 16.10.-20.10.2023 16.10.2023 5 days 5T Wien Online
    • Online Training 3.995,-
      • Virtual training – live in the seminar
      • You don’t have to travel to the seminar centre
      • Seminar document, teamwork, labs 24/7
      • ETC>Live support and hotline
      • ETC services
      Examen ist im Preis inkludiert
    • Classroom Training 3.995,-
      • Your seminar
      • Seminar documents, teamwork, labs
      • Food & drinks on site
      • Seminar services
      Examen ist im Preis inkludiert

Preise exkl. MwSt.

Do you have questions?

We are happy to call.
Privacy Policy*
5,0

6 evaluations

  • 25.04.2023

    Gutes Seminar

    — Florian R.
  • 21.10.2022

    Top Seminar und perfekt vorgetragen

    — Hermann S.
  • 21.10.2022

    sehr umfangreich, der Trainer gab sehr praxisnahe Beispiele

    — Maiwand T.
  • 21.10.2022

    Sehr gutes Seminar, gute Prüfungsvorbereitung

    — Thomas B.
  • 21.04.2022

    Top Seminar und Prüfungsvorbereitung!

    — Gerhard M.
  • 18.06.2021

    Der Kurs zeigt das breite Spektrum des vielschichtigen Themas Security. Die äußerst umfangreichen Unterlagen und Folien zeigen diverse Aspekte, Themen und Tools der Sicherheit auf. Man findet ebenso Themengebiete, bei denen man nicht unmittelbar an Security gedacht hätte. Durch die neue Kursversion2 werden auch aktuelle Themen, wie ua. Cloud Security, behandelt. Die umfangreiche Laborumgebung ist wirklich gut, einfach zu handhaben (z.B. einfügen von Kennwörtern oder Eingabebefehlen mittels oneClick), leicht verständlich und auch einige Zeit nach dem Kurs benutzbar (z.B. Tools oder Plattformen testen, Übungen wiederholen, …). Der Trainer war sehr versiert und hat oft Praxisbeispiele im Vortrag eingebracht. Der Kurs ist überaus praxisnahe, ein sehr guter fundierter Gesamtüberblick und absolut empfehlenswert. Für mich war es ein tolles Training um in die IT/Cyber-Security einzutauchen.

    — Herbert G.

More trainings for you to consider