-
EC-Council's Certified Network Defender (C|ND) is an essential vendor-neutral network security certification for any IT and system administrator who needs to work with a secure mindset. Participants will learn the critical skills needed to defend their networks and operating environments across on-premises networks, endpoints, cloud infrastructures, applications, OT and mobile.
They will also gain knowledge of effective and accurate log analysis, network traffic monitoring, basic investigation and response, and business continuity and disaster recovery. In addition, they will learn about threats, analyzing the attack surface and predicting threats and threat intelligence in relation to their management and defense roles.
C|NDs will be able to apply defense and countermeasure strategies in their organizations and apply countermeasures in their organizations, playing an important role not only in attack prevention, but also in examples not only in attack prevention, but also in the detection, response and remediation of security vulnerabilities by configuring networks and systems for secure operations.
The C|ND program covers the concepts and reinforces skills through hands-on practice in over 100 practical exercises on real target computers.
Developed by industry experts, the C|ND program prepares network defenders with strategic, technological and operational network security skills that enable them to design, develop and maintain secure networks. -
Course Contents
-
- Understanding network security management
- Establishing network security policies and procedures
- Windows and Linux security administration
- Setting up mobile and IoT device security
- Implementing data security techniques on networks
- Embedding virtualization technology security
- Determining cloud and wireless security
- Deploying and using risk assessment tools
- Learn basics of first response and forensics
- Understanding indicators of Compromise, Attack, and Exposures (IoC, IoA, IoE)
- Building threat intelligence capabilities
- Establishing and monitoring log management
- Implementing endpoint security
- Configuring optimum firewall solutions
- Understanding and using IDS/IPS technologies
- Establishing Network Authentication, Authorization, Accounting (AAA)
-
Target Group
-
- Network administrators
- Network security administrators
- Network security specialists
- Network security technicians
- CND analysts
- Security analysts
- Security technicians
- People involved in network operations
-
Exam
Once you have completed the course and have been evaluated by EC-Council, you will receive a voucher for the "Certified Network Defender 312-38" exam from us at no additional cost, which you can then take at a VUE test center.
Module 01: Network Attacks and Defense Strategies |
Module 02: Administrative Network Security |
Module 03: Technical Network Security |
Module 04: Network Perimeter Security |
Module 05: Endpoint Security-Windows Systems |
Module 06: Endpoint Security-Linux Systems |
Module 07: Endpoint Security- Mobile Devices |
Module 08: Endpoint Security-IoT Devices |
Module 09: Administrative Application Security |
Module 10: Data Security |
Module 11: Enterprise Virtual Network Security |
Module 12: Enterprise Cloud Network Security |
Module 13: Enterprise Wireless Network Security |
Module 14: Network Traffic Monitoring and Analysis |
Module 15: Network Logs Monitoring and Analysis |
Module 16: Incident Response and Forensic Investigation |
Module 17: Business Continuity and Disaster Recovery |
Module 18: Risk Anticipation with Risk Management |
Module 19: Threat Assessment with Attack Surface Analysis |
Module 20: Threat Prediction with Cyber Threat Intelligence |
-
Classroom training
- Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!
-
Hybrid training
- Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.
-
Online training
- You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.
-
Tailor-made courses
-
You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.

-
EC-Council's Certified Network Defender (C|ND) is an essential vendor-neutral network security certification for any IT and system administrator who needs to work with a secure mindset. Participants will learn the critical skills needed to defend their networks and operating environments across on-premises networks, endpoints, cloud infrastructures, applications, OT and mobile.
They will also gain knowledge of effective and accurate log analysis, network traffic monitoring, basic investigation and response, and business continuity and disaster recovery. In addition, they will learn about threats, analyzing the attack surface and predicting threats and threat intelligence in relation to their management and defense roles.
C|NDs will be able to apply defense and countermeasure strategies in their organizations and apply countermeasures in their organizations, playing an important role not only in attack prevention, but also in examples not only in attack prevention, but also in the detection, response and remediation of security vulnerabilities by configuring networks and systems for secure operations.
The C|ND program covers the concepts and reinforces skills through hands-on practice in over 100 practical exercises on real target computers.
Developed by industry experts, the C|ND program prepares network defenders with strategic, technological and operational network security skills that enable them to design, develop and maintain secure networks. -
Course Contents
-
- Understanding network security management
- Establishing network security policies and procedures
- Windows and Linux security administration
- Setting up mobile and IoT device security
- Implementing data security techniques on networks
- Embedding virtualization technology security
- Determining cloud and wireless security
- Deploying and using risk assessment tools
- Learn basics of first response and forensics
- Understanding indicators of Compromise, Attack, and Exposures (IoC, IoA, IoE)
- Building threat intelligence capabilities
- Establishing and monitoring log management
- Implementing endpoint security
- Configuring optimum firewall solutions
- Understanding and using IDS/IPS technologies
- Establishing Network Authentication, Authorization, Accounting (AAA)
-
Target Group
-
- Network administrators
- Network security administrators
- Network security specialists
- Network security technicians
- CND analysts
- Security analysts
- Security technicians
- People involved in network operations
-
Exam
Once you have completed the course and have been evaluated by EC-Council, you will receive a voucher for the "Certified Network Defender 312-38" exam from us at no additional cost, which you can then take at a VUE test center.
Module 01: Network Attacks and Defense Strategies |
Module 02: Administrative Network Security |
Module 03: Technical Network Security |
Module 04: Network Perimeter Security |
Module 05: Endpoint Security-Windows Systems |
Module 06: Endpoint Security-Linux Systems |
Module 07: Endpoint Security- Mobile Devices |
Module 08: Endpoint Security-IoT Devices |
Module 09: Administrative Application Security |
Module 10: Data Security |
Module 11: Enterprise Virtual Network Security |
Module 12: Enterprise Cloud Network Security |
Module 13: Enterprise Wireless Network Security |
Module 14: Network Traffic Monitoring and Analysis |
Module 15: Network Logs Monitoring and Analysis |
Module 16: Incident Response and Forensic Investigation |
Module 17: Business Continuity and Disaster Recovery |
Module 18: Risk Anticipation with Risk Management |
Module 19: Threat Assessment with Attack Surface Analysis |
Module 20: Threat Prediction with Cyber Threat Intelligence |
-
Classroom training
- Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!
-
Hybrid training
- Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.
-
Online training
- You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.
-
Tailor-made courses
-
You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
