Certified Network Defender CND

Similar documents
EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

CompTIA Mobility+ Course Description

MCTS and MCITP: Windows 7 Configuration and Desktop Support Technician

CIPP/G (Certified Information Privacy Professional US Government)

CIPT Certified Information Privacy Technologist

Certified Ethical Hacker - CEH v9 Training & Certification

MCTS: SQL Server 2008 Implementation and Maintenance

MCSA: Windows 2012 Server

CND Exam Blueprint v2.0

PMP (Project Management Professional)

MCITP: Windows Server 2008 R2, Virtualization Administrator

MCTS: Microsoft SQL Server 2008 Database Development

MCSA / MCSE: Windows 2012 Server Infrastructure

CCNA Routing & Switching

MCTS: Microsoft Exchange Server 2010

MCTS:.NET Framework 4, Windows Applications Development

CompTIA Cybersecurity Analyst+

CCISO Blueprint v1. EC-Council

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

CIPP/US (Certified Information Privacy Professional US Private-Sector)

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI)

PROTECTING INFORMATION ASSETS NETWORK SECURITY

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

Certified Network Defender v1. Overview

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified

Course 831 Certified Ethical Hacker v9

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified

Course Outline. Module 01: Computer Network and Defense Fundamentals

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

Course 831 EC-Council Certified Ethical Hacker v10 (CEH)

EC-Council C EH. Certified Ethical Hacker. Program Brochure

Security+ SY0-501 Study Guide Table of Contents

The following chart provides the breakdown of exam as to the weight of each section of the exam.

MCTS:.NET Framework 4, Web Applications

Cybersecurity Conference Presentation North Bay Business Journal. September 27, 2016

EC-Council Certified Network Defender

Education Network Security

BraindumpsVCE. Best vce braindumps-exam vce pdf free download

Required Textbook and Materials. Course Objectives. Course Outline

CEH: CERTIFIED ETHICAL HACKER v9

Cybersecurity Auditing in an Unsecure World

Securing Information Systems

SINGLE COURSE. NH9000 Certified Ethical Hacker 104 Total Hours. COURSE TITLE: Certified Ethical Hacker

EC-Council C EH. Certified Ethical Hacker. Program Brochure

Certified Network Defender

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

Hands-On CompTIA A+ Essentials / Practical Application Certification

Networking Fundamentals Training

Information Security in Corporation

FRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Balancing Compliance and Operational Security Demands. Nov 2015 Steve Winterfeld

Ethical Hacking and Prevention

Certified Ethical Hacker (CEH)

Motorola AirDefense Retail Solutions Wireless Security Solutions For Retail

Security

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

Security Terminology Related to a SOC

Advanced Diploma on Information Security

This ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process.

EC-Council - EC-Council Certified Security Analyst (ECSA) v8

IC32E - Pre-Instructional Survey

CompTIA A+ Accelerated course for & exams

IT Foundations Networking Specialist Certification with Exam

Altius IT Policy Collection Compliance and Standards Matrix

SECURITY ON AWS 8/3/17. AWS Security Standards MORE. By Max Ellsberry

CTS performs nightly backups of the Church360 production databases and retains these backups for one month.

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

Crises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe.

ETHICAL HACKING & COMPUTER FORENSIC SECURITY

Security Assessment Checklist

University of Pittsburgh Security Assessment Questionnaire (v1.7)

Altius IT Policy Collection Compliance and Standards Matrix

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Unlocking the Power of the Cloud

Course Outline. CCNA Cyber Ops SECOPS Official Cert Guide (Course & Labs)

CompTIA Security+ SY Course Outline. CompTIA Security+ SY May 2018

Click to edit Master title style. DIY vs. Managed SIEM

EC-Council Certified Incident Handler v2. Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1

The GenCyber Program. By Chris Ralph

ANATOMY OF AN ATTACK!

CIT 480: Securing Computer Systems. Putting It All Together

Cisco Adaptive Wireless Intrusion Prevention System: Protecting Information in Motion

COPYRIGHTED MATERIAL. Contents

Syllabus: The syllabus is broadly structured as follows:

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Software Development & Education Center Security+ Certification

Payment Card Industry (PCI) Data Security Standard

CCNA Cybersecurity Operations. Program Overview

locuz.com SOC Services

Altius IT Policy Collection

MOS (Microsoft Office Specialist) Word-Excel- PowerPoint 2010

PND at a glance: The World s Premier Online Practical Network Defense course. Self-paced, online, flexible access

Learn about the Fundamental building blocks that go into building a Windows Server infrastructure with Windows Server 2012.

CRYPTTECH. Cost-effective log management for security and forensic analysis, ensuring compliance with mandates and storage regulations

McAfee Network Security Platform Administration Course

Operational Network Security

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

Implementing and Administering Security in a Microsoft Windows 2000 Network Course 2820 Five days Instructor-led Published: February 17, 2004

Cybersecurity Training

Transcription:

Certified Network Defender CND SecureNinja's CND (Certified Network Defender) training and certification boot camp in Alexandria, VA, Dulles, VA and San Diego, CA prepares network administrators on network security technologies and operations to attain Defense in-depth network security preparedness. It covers the protect, detect and respond approach to network security. The course contains hands-on labs, based on major network security tools and techniques which will provide network administrators real world expertise on current network security technologies and operations. The study-kit provides you with over 10 GB of network security best practices, assessments and protection tools. The kit also contains templates for various network policies and a large number of white papers for additional learning. This course prepares you for EC-Council s CND (Certified Network Defender) exam 312-38. CND (Certified Network Defender) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and responsibilities and the Department of Defense (DoD) job roles for system/network administrators. The course is designed and developed after extensive market research and surveys. Course Objectives how to protect, detect and respond to network attacks network defense fundamentals the application of network security controls, protocols, perimeter appliances, secure IDS, VPN and firewall config the intricacies of network traffic signature, analysis and vulnerability scanning Course Mappings CND is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE). The course is mapped to the Department of Defense (DoD) job roles for system/network administrators. Why Certified Network Defender? Organizational focus on cyber defense is more important than ever as cyber breaches have a far greater financial impact and can cause broad reputational damage. Despite best efforts to prevent breaches, many organizations are still being compromised. Therefore, organizations must have, as part of their defense mechanisms, trained network engineers who are focused on protecting, detecting, and responding to the threats on their networks. Network administrators spends a lot of time with network environments, and are familiar 1 / 8

with network components, traffic, performance and utilization, network topology, location of each system, security policy, etc. So, organizations can be much better in defending themselves from vicious attacks if the IT and network administrators equipped with adequate network security skills.thus Network administrator can play a significant role in network defense and become first line of defense for any organizations. There is no proper tactical network security training that is made available for network administrators which provides them core network security skills. Students enrolled in the Certified Network Defender course, will gain a detailed understanding and hands on ability to function in real life situations involving network defense. They will gain the technical depth required to actively design a secure network in your organization. This program will begin to learning math instead of just using a calculator. This course gives you the fundamental understanding of the true construct of data transfer, network technologies, software technologies so that you understand how networks operate, understand what software is automating and how to analyze the subject material. You will learn how to protect, detect and respond to the network attacks. You will learn network defense fundamentals, the application of network security controls, protocols, perimeter appliances, secure IDS, VPN and firewall configuration. You will then learn the intricacies of network traffic signature, analysis and vulnerability scanning which will help you when you design greater network security policies and successful incident response plans. These skills will help you foster resiliency and continuity of operations during attacks. What You Will Learn Student will learn about various network security controls, protocols, and devices Students will able to troubleshoot their network for various network problems Student will able identify various threats on organization network Student will learn how to design and implement various security policies for their organizations Student will learn the importance of physical security and able to determine and implement various physical security controls for their organizations Student will able to harden security of various hosts individually in the organization s network Student will able to choose appropriate firewall solution, topology, and configurations to harden security through firewall Student will able to determine appropriate location for IDS/IPS sensors, tuning IDS for false positives and false negatives, and configurations to harden security through IDPS technologies Students will able to implement secure VPN implementation for their organization Student will able identify various threats to wireless network and learn how to mitigate them Student will able to monitor and conduct signature analysis to detect various types of attacks and policy violation activities. Student will able to perform risk assessment, vulnerability assessment/scanning 2 / 8

through various scanning tools and generate detailed reports on it Student will able to identify the critical data, choose appropriate back up method, media and technique to perform successful backup of organization data on regular basis Student will able to provide first response to the network security incident and assist IRT team and forensics investigation team in dealing with an incident. Who Should Attend Network Administrators Network Defense Technicians Network security Administrators CND Analyst Network Security Engineer Security Analyst Security Operator Anyone who involves in network operations CND (Certified Network Defender) Exam Info Courseware Number of Questions: 100 Passing Score: 70% Test Duration: 4 Hours Test Format: Interactive Multiple Choice Questions Test Delivery: Prometric Prime / VUE / ECCEXAM Exam Code: 312-38 Official Certified Network Defender Courseware Course Length 40 hours Course Modules Module 1 - Computer Network Defense Fundamentals Network Fundamentals Network Components TCP/IP Networking Basics TCP/IP Protocol Stack IP Addressing Computer Network Defense (CND) CND Triad CND Process CND Actions CND Approaches Module 02 - Network Security Threats, Vulnerabilities, and Attacks 3 / 8

Essential Terminologies Network Security Concerns Network Security Vulnerabilities Network Reconnaissance Attacks Network Access Attacks Denial of Service (DoS) Attacks Distributed Denial-of-Service Attack (DDoS) Malware Attacks Module 03 - Network Security Controls, Protocols, and Devices Fundamental Elements of Network Security Network Security Controls User Identification, Authentication, Authorization and Accounting Types of Authorization Systems Authorization Principles Cryptography Security Policy Network Security Devices Network Security Protocols Module 04 - Network Security Policy Design and Implementation What is Security Policy? Internet Access Policies Acceptable-Use Policy User-Account Policy Remote-Access Policy Information-Protection Policy Firewall-Management Policy Special-Access Policy Network-Connection Policy Business-Partner Policy Email Security Policy Passwords Policy Physical Security Policy Information System Security Policy Bring Your Own Devices (BYOD) Policy Software/Application Security Policy Data Backup Policy Confidential Data Policy Data Classification Policy Internet Usage Policies Server Policy Wireless Network Policy Incidence Response Plan (IRP) User Access Control Policy Switch Security Policy Intrusion Detection and Prevention (IDS/IPS) Policy Personal Device Usage Policy Encryption Policy Router Policy 4 / 8

Security Policy Training and Awareness ISO Information Security Standards Payment Card Industry Data Security Standard (PCI-DSS) Health Insurance Portability and Accountability Act (HIPAA) Information Security Acts - Sarbanes Oxley Act (SOX) Information Security Acts - Gramm-Leach-Bliley Act (GLBA) Information Security Acts - The Digital Millennium Copyright Act (DMCA) and Federal Information Security Management Act (FISMA) Other Information Security Acts and Laws Module 05 - Physical Security Physical Security Access Control Authentication Techniques Physical Security Controls Other Physical Security Measures Workplace Security Personnel Security - Managing Staff Hiring and Leaving Process Laptop Security Tool - EXO5 Environmental Controls Physical Security - Awareness /Training Physical Security Checklists Module 06 - Host Security Host Security OS Security Linux Security Securing Network Servers Hardening Routers and Switches Application/software Security Data Security Virtualization Security Module 07 - Secure Firewall Configuration and Management Firewalls and Concerns What Firewalls Does? What should you not Ignore? - Firewall Limitations How Does a Firewall Work? Firewall Rules Types of Firewalls Firewall Technologies Firewall Topologies Firewall Rule Set & Policies Firewall Implementation Firewall Administration Firewall Logging and Auditing Firewall Anti-evasion Techniques Why Firewalls are Bypassed? Full Data Traffic Normalization Data Stream-based Inspection Vulnerability-based Detection and Blocking 5 / 8

Firewall Security Recommendations and Best Practices Firewall Security Auditing Tools Module 08 - Secure IDS Configuration and Management Intrusions and IDPS IDS Types of IDS Implementation IDS Deployment Strategies Types of IDS Alerts IPS IDPS Product Selection Considerations IDS Counterparts Module 09 - Secure VPN Configuration and Management Understanding Virtual Private Network (VPN) How VPN works? Why to Establish VPN? VPN Components VPN Concentrators Types of VPN VPN Categories Selecting Appropriate VPN VPN Core Functions VPN Technologies VPN Topologies Common VPN Flaws VPN Security Quality Of Service and Performance in VPNs Module 10 - Wireless Network Defense Wireless Terminologies Wireless Networks Wireless Standard Wireless Topologies Typical Use of Wireless Networks Components of Wireless Network WEP (Wired Equivalent Privacy) Encryption WPA (Wi-Fi Protected Access) Encryption WPA2 Encryption WEP vs. WPA vs. WPA2 Wi-Fi Authentication Method Wi-Fi Authentication Process Using a Centralized Authentication Server Wireless Network Threats Bluetooth Threats Wireless Network Security Wi-Fi Discovery Tools Locating Rogue Access points Protecting from Denial-of-Service Attacks - Interference Assessing Wireless Network Security Wi-Fi Security Auditing Tool - AirMagnet WiFi Analyzer 6 / 8

WPA Security Assessment Tool Wi-Fi Vulnerability Scanning Tools Deploying Wireless IDS (WIDS) and Wireless IPS (WIPS) WIPS Tool Configuring Security on Wireless Routers Additional Wireless Network Security Guidelines Module 11 - Network Traffic Monitoring and Analysis Network Traffic Monitoring and Analysis(Introduction) Network Monitoring - Positioning your Machine at Appropriate Location Network Traffic Signatures Packet Sniffer - Wireshark Detecting OS Fingerprinting Attempts Detecting PING Sweep Attempt Detecting ARP Sweep/ ARP Scan Attempt Detecting TCP Scan Attempt Detecting SYN/FIN DDOS Attempt Detecting UDP Scan Attempt Detecting Password Cracking Attempts Detecting FTP Password Cracking Attempts Detecting Sniffing (MITM) Attempts Detecting the Mac Flooding Attempt Detecting the ARP Poisoning Attempt Additional Packet Sniffing Tools Network Monitoring and Analysis Bandwidth Monitoring Module 12 - Network Risk and Vulnerability Management What is Risk? Risk Levels Risk Matrix Key Risk Indicators(KRI) Risk Management Phase Enterprise Network Risk Management Vulnerability Management Module 13 - Data Backup and Recovery Introduction to Data Backup RAID (Redundant Array Of Independent Disks) Technology Storage Area Network (SAN) Network Attached Storage (NAS) Selecting Appropriate Backup Method Choosing the Right Location for Backup Backup Types Conducting Recovery Drill Test Data Recovery Windows Data Recovery Tool RAID Data Recovery Services SAN Data Recovery Software NAS Data Recovery Services 7 / 8

Powered by TCPDF (www.tcpdf.org) Web: www.secureninja.com Module 14 - Network Incident Response and Management Incident Handling and Response Incident Response Team Members - Roles and Responsibilities First Responder Incident Handling and Response Process Overview of IH&R Process Flow About SecureNinja SecureNinja Training is the DC s Area s #1 Expert IT Training Center. We are conveniently located in beautiful Historic Old Town Alexandria, VA enhancing your training experience and featuring - Metro Accessibility - Short walk from Metro Blue/Yellow Line (leave the car behind) 4-minute Drive to Ronald Reagan Washington, DC National Airport Available Parking World class restaurants and shops at your footsteps Closest Expert IT & IT Security Training Center to Fort Belvoir, Boiling AFB, Fort Myer, Department of Homeland Security, US Department of Navy, US Coast Guard, Fort McNair, Washington Navy Yard and the Pentagon Why Choose SecureNinja for your Washington DC Expert IT Training? Expert Instructors Highest Pass Rates Choose from Day, Evening & Weekend Classes to meet your busy schedule Accelerated Boot Camps Save You Time And Money Paid Internships & Job Referrals! Meet Your DoD 8570-1 Certification Needs. Get Compliant! Secure Ninja is the ONLY Testing Center that offers ALL 5 industry standard test vendors in the DC / Baltimore Metropolitan Area. ( VUE, Kryterion-Online, Certiport and Impact-Testing) Lowest Prices! We are locally based keeping our overhead low so we can pass the savings along to you Northern Virginia is our Home. Most training centers set up shop in hotels or rented centers. When you have a need, request or encounter a problem they are not there to answer. Our physical location in Alexandria, VA is open 7 days a week and our staff always there to help. SecureNinja training courses; Instructor-led and Live Online, are open to all corporate and government sponsored customers only. 8 / 8