EC-Council ATC Logo

CNDv2

Certified Network Defender

EC-Council ATC Logo

Certified Network Defender (CNDv2) training is a vendor-neutral, hands-on, comprehensive network security certification program. In this instructor-led, practice-intensive program, based on an analysis of cybersecurity job requirements and measures and presented by the National Initiative of Cybersecurity Education (NICE) working group, you will gain all the skills you need in cybersecurity. The course is also aligned with global job requirements and responsibilities, as well as U.S. Department of Defense job requirements for system/network administrators. The course was designed and developed based on extensive market research and surveys. In this program, network administrators will learn network security technologies and procedures that will prepare them to build an in-depth protection architecture for their networks. It covers the "protect, detect and respond" approach to network security. The course includes hands-on exercises on key network security tools and techniques. These exercises give network administrators hands-on experience with current network security technologies and operations. The 10+ GB of learning material includes best practices, assessments and security tools to protect networks. The material also includes templates for various network policies and numerous white papers.

Course Contents

  • Understanding network security management
  • Establishing network security policies and procedures
  • Windows and Linux security administration
  • Setting up mobile and IoT device security
  • Implementing data security techniques on networks
  • Embedding virtualization technology security
  • Determining cloud and wireless security
  • Deploying and using risk assessment tools
  • Learn basics of first response and forensics
  • Understanding indicators of Compromise, Attack, and Exposures (IoC, IoA, IoE)
  • Building threat intelligence capabilities
  • Establishing and monitoring log management
  • Implementing endpoint security
  • Configuring optimum firewall solutions
  • Understanding and using IDS/IPS technologies
  • Establishing Network Authentication, Authorization, Accounting (AAA)

Target Group

  • Network administrators
  • Network security administrators
  • Network security specialists
  • Network security technicians
  • CND analysts
  • Security analysts
  • Security technicians
  • People involved in network operations

Exam

Once you have completed the course and have been evaluated by EC-Council, you will receive a voucher for the "Certified Network Defender 312-38" exam from us at no additional cost, which you can then take at a VUE test center.

 
Module 01: Network Attacks and Defense Strategies
 
Module 02: Administrative Network Security
 
Module 03: Technical Network Security
 
Module 04: Network Perimeter Security
 
Module 05: Endpoint Security-Windows Systems
 
Module 06: Endpoint Security-Linux Systems
 
Module 07: Endpoint Security- Mobile Devices
 
Module 08: Endpoint Security-IoT Devices
 
Module 09: Administrative Application Security
 
Module 10: Data Security
 
Module 11: Enterprise Virtual Network Security
 
Module 12: Enterprise Cloud Network Security
 
Module 13: Enterprise Wireless Network Security
 
Module 14: Network Traffic Monitoring and Analysis
 
Module 15: Network Logs Monitoring and Analysis
 
Module 16: Incident Response and Forensic Investigation
 
Module 17: Business Continuity and Disaster Recovery
 
Module 18: Risk Anticipation with Risk Management
 
Module 19: Threat Assessment with Attack Surface Analysis
 
Module 20: Threat Prediction with Cyber Threat Intelligence

Classroom training

Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!

Online training

You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.

Tailor-made courses

You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
Request for customized courses
PDF SymbolYou can find the complete description of this course with dates and prices ready for download at as PDF.

Certified Network Defender (CNDv2) training is a vendor-neutral, hands-on, comprehensive network security certification program. In this instructor-led, practice-intensive program, based on an analysis of cybersecurity job requirements and measures and presented by the National Initiative of Cybersecurity Education (NICE) working group, you will gain all the skills you need in cybersecurity. The course is also aligned with global job requirements and responsibilities, as well as U.S. Department of Defense job requirements for system/network administrators. The course was designed and developed based on extensive market research and surveys. In this program, network administrators will learn network security technologies and procedures that will prepare them to build an in-depth protection architecture for their networks. It covers the "protect, detect and respond" approach to network security. The course includes hands-on exercises on key network security tools and techniques. These exercises give network administrators hands-on experience with current network security technologies and operations. The 10+ GB of learning material includes best practices, assessments and security tools to protect networks. The material also includes templates for various network policies and numerous white papers.

Course Contents

  • Understanding network security management
  • Establishing network security policies and procedures
  • Windows and Linux security administration
  • Setting up mobile and IoT device security
  • Implementing data security techniques on networks
  • Embedding virtualization technology security
  • Determining cloud and wireless security
  • Deploying and using risk assessment tools
  • Learn basics of first response and forensics
  • Understanding indicators of Compromise, Attack, and Exposures (IoC, IoA, IoE)
  • Building threat intelligence capabilities
  • Establishing and monitoring log management
  • Implementing endpoint security
  • Configuring optimum firewall solutions
  • Understanding and using IDS/IPS technologies
  • Establishing Network Authentication, Authorization, Accounting (AAA)

Target Group

  • Network administrators
  • Network security administrators
  • Network security specialists
  • Network security technicians
  • CND analysts
  • Security analysts
  • Security technicians
  • People involved in network operations

Exam

Once you have completed the course and have been evaluated by EC-Council, you will receive a voucher for the "Certified Network Defender 312-38" exam from us at no additional cost, which you can then take at a VUE test center.

 
Module 01: Network Attacks and Defense Strategies
 
Module 02: Administrative Network Security
 
Module 03: Technical Network Security
 
Module 04: Network Perimeter Security
 
Module 05: Endpoint Security-Windows Systems
 
Module 06: Endpoint Security-Linux Systems
 
Module 07: Endpoint Security- Mobile Devices
 
Module 08: Endpoint Security-IoT Devices
 
Module 09: Administrative Application Security
 
Module 10: Data Security
 
Module 11: Enterprise Virtual Network Security
 
Module 12: Enterprise Cloud Network Security
 
Module 13: Enterprise Wireless Network Security
 
Module 14: Network Traffic Monitoring and Analysis
 
Module 15: Network Logs Monitoring and Analysis
 
Module 16: Incident Response and Forensic Investigation
 
Module 17: Business Continuity and Disaster Recovery
 
Module 18: Risk Anticipation with Risk Management
 
Module 19: Threat Assessment with Attack Surface Analysis
 
Module 20: Threat Prediction with Cyber Threat Intelligence

Classroom training

Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!

Online training

You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.

Tailor-made courses

You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
Request for customized courses

PDF SymbolYou can find the complete description of this course with dates and prices ready for download at as PDF.