CND: Certified Network Defender v2
Learn the skills that matter! EC-Council’s vendor-neutral network security certifications provide an unbiased approach to learning secure networking practices, as well as how to analyze and harden computing systems prevalent in the current IT infrastructure.
CND v2 has earned a reputation as the only program in the market that is 100% focused on network security and defense.
Exam
Certification by
per person
Level
Duration
Training Delivery Format
Face-to-face / Virtual Class
Associated Certification
per person
Level
Duration
Training Delivery Format
Face-to-face (F2F) / Virtual Class
Associated Certification
Class types
Public Class
Private Class
In-House Training
Bespoke
About this course
The CND Training, also known as Certified Network Defender v2, aligns with the cybersecurity education framework and work role task analysis introduced by the National Info comm Competency Framework (NICF). This upgraded version of the CND course is equipped with powerful resources and strategies to empower Blue Teams in their mission to protect networks and triumph over breaches.
In the present landscape, CND training courses have become a top priority for enterprises aiming to adapt to a post-COVID world. With the shift to remote work, the security perimeter has expanded to include the identities and devices of employees. As a matter of fact, cybersecurity has become equally indispensable as internet access itself for businesses.
Who should attend?
Recommended for individuals who have a fundamental knowledge of networking concepts. Also, help those in job roles to enhance their career:
- Network Administrators
- IT Administrators
- Network Engineers
- Data Analysts
- Network Technicians
Learning Outcome
- Gaining knowledge of network security management
- Developing network security policies and protocols
- Administering security for Windows and Linux systems
- Securing mobile and IoT devices
- Implementing data security methods on networks
- Incorporating security measures for virtualization technology
- Assessing security requirements for cloud and wireless networks
- Deploying and utilizing tools for risk assessment
- Acquiring foundational skills in first response and forensic analysis
- Understanding indicators of compromise, attack, and exposure (IoC, IoA, IoE)
- Developing capabilities in threat intelligence
- Establishing and monitoring log management systems
- Implementing endpoint security measures
- Configuring effective firewall solutions
- Familiarizing with IDS/IPS technologies and their usage
- Establishing network authentication, authorization, and accounting (AAA) mechanisms
Prerequisites
The candidate must have at least 2 years of work experience in the Information Security domain.
Course Content
Module 1: Network Attacks and Defense Strategies
Module 2: Administrative Network Security
Module 3: Technical Network Security
Module 4: Network Perimeter Security
Module 5: Endpoint Security-Windows Systems
Module 6: Endpoint Security-Linux Systems
Module 7: Endpoint Security- Mobile Devices
Module 8: Endpoint Security-IoT Devices
Module 9: Administrative Application Security
Module 10: Data Security
Module 11: Enterprise Virtual Network Security
Module 12: Enterprise Cloud Network Security
Module 13: Enterprise Wireless Network Security
Module 14: Network Traffic Monitoring and Analysis
Module 15: Network Logs Monitoring and Analysis
Module 15: Network Logs Monitoring and Analysis
Module 16: Incident Response and Forensic Investigation
Module 17: Business Continuity and Disaster Recovery
Module 18: Risk Anticipation with Risk Management
Module 19: Threat Assessment with Attack Surface Analysis
Module 20: Threat Prediction with Cyber Threat Intelligence
Certification
C|ND
Protect, Detect, Response, and Predict
To ensure the utmost integrity of certification examinations, multiple-question banks are utilized. Each exam form undergoes a meticulous analysis process, which involves beta testing with a representative sample group under the supervision of a committee consisting of subject matter experts.
This rigorous approach guarantees that cyber defense certification exams not only possess academic rigor but also reflect real-world hacking scenarios, providing a comprehensive testing experience.
Number of questions: 100
Test duration: 4 hours
Test format: Multiple choice
Testing delivery: ECC Exam
FAQs
What are the recent advancements in technology that I will gain knowledge of in the EC-Council CND v2, in contrast to v1?
In the Certified Network Defender course, you will be introduced to cutting-edge technologies including Network Function Virtualization (NFV) security, Kubernetes Security, docker security, Software Defined Network (SDN) security, and container security.
What advantages can I gain from undergoing the Certified Network Defender (CND) training?
The objective of the CND course is to assist Blue Teams in successfully defending against and defeating network breaches. This cyber defense training is highly advantageous due to the following reasons:
- Aligned with globally recognized job role frameworks commonly used by organizations.
- Mapped to the NICE 2.0 framework, ensuring comprehensive coverage.
- Accredited program according to ANSI/ISO/IEC 17024 standards.
- Includes the most recent technologies such as cloud, IoT, threats related to remote workers, and virtualization.
- Encompasses up-to-date methodologies, techniques, and tools utilized by cybersecurity professionals.
Can CND enhance my career prospects in the field of cybersecurity?
With advanced technologies, cybersecurity has become an essential necessity across industries. Organizations have recognized the importance of safeguarding their network perimeters through robust defensive strategies to combat sophisticated cyberattacks. As a result, professionals specializing in network defense enjoy a wider career scope compared to individuals in other domains.
What are the duties and responsibilities of a network administrator?
The role of a network administrator is crucial in ensuring the cybersecurity of an enterprise, as they serve as the initial line of defense during a cyber-attack. They bear the responsibility of managing and maintaining the infrastructure of the system, with a primary focus on networking aspects. Their expertise encompasses knowledge of network topologies, components, security policies, network performance, and traffic.
Network administrators conduct vulnerability assessments to identify weaknesses, install security programs, monitor network security updates, and evaluate the effectiveness of implemented network measures.
How can I prepare for the exam?
You can join our face-to-face public or virtual or Bespoke class. Just choose the right class type for your learning needs and goal.
Is this an HRDC claimable course?
Yes, this is an HRDC claimable course
At this time, this course is available for private class and in-house training only. Please contact us for any inquiries.