Certified Network Defender
A comprehensive program that covers 14 of the most current network security domains needed for planning to protect, detect, and respond to the network attacks.



Ideal For
This program is designed for beginners and does not have any mandatory prerequisites. However, it is recommended that individuals who possess a basic understanding of networking concepts consider taking Certified Network Defender v2.
This program is designed for beginners and does not have any mandatory prerequisites. However, it is recommended that individuals who possess a basic understanding of networking concepts consider taking Certified Network Defender v2.
This program is designed for beginners and does not have any mandatory prerequisites. However, it is recommended that individuals who possess a basic understanding of networking concepts consider taking Certified Network Defender v2.
What to Expect
SKILL LEVEL
Beginner
DURATION
3 Months
CERTIFICATION
After Completion
LANGUAGE
English
Skills You Will Learn
Network Attacks and Defence Strategies
Administrative Network Security
Technical Network Security
Network Perimeter Security
Endpoint Security-Windows Systems
Endpoint Security-Linux Systems
Endpoint Security- Mobile Devices
Endpoint Security-loT Devices
Administrative Application Security
Data Security
Network Attacks and Defence Strategies
Administrative Network Security
Technical Network Security
Network Perimeter Security
Endpoint Security-Windows Systems
Endpoint Security-Linux Systems
Endpoint Security- Mobile Devices
Endpoint Security-loT Devices
Administrative Application Security
Data Security
Network Attacks and Defence Strategies
Administrative Network Security
Technical Network Security
Network Perimeter Security
Endpoint Security-Windows Systems
Endpoint Security-Linux Systems
Endpoint Security- Mobile Devices
Endpoint Security-loT Devices
Administrative Application Security
Data Security
Enterprise Virtual Network Security
Enterprise Cloud Network Security
Enterprise Wireless Network Security
Network Traffic Monitoring and Analysis
Network Logs Monitoring and Analysis
Incident Response and Forensic Investigation
And more!
Enterprise Virtual Network Security
Enterprise Cloud Network Security
Enterprise Wireless Network Security
Network Traffic Monitoring and Analysis
Network Logs Monitoring and Analysis
Incident Response and Forensic Investigation
And more!
Enterprise Virtual Network Security
Enterprise Cloud Network Security
Enterprise Wireless Network Security
Network Traffic Monitoring and Analysis
Network Logs Monitoring and Analysis
Incident Response and Forensic Investigation
And more!
Module
Expand All +
Pre-Work: Preparatory Lessons
Module Title 1
Module Title 2
Module
Expand All +
Pre-Work: Preparatory Lessons
Module Title 1
Module Title 2
Course Outcome
Knowledge on how to protect, detect, and respond to network attacks Network defence fundamentals
Application of network security controls, protocols, perimeter appliances, secure IDS, VPN, and firewall configuration
Intricacies of network traffic signature, analysis, and vulnerability scanning
Knowledge on how to protect, detect, and respond to network attacks Network defence fundamentals
Application of network security controls, protocols, perimeter appliances, secure IDS, VPN, and firewall configuration
Intricacies of network traffic signature, analysis, and vulnerability scanning
Knowledge on how to protect, detect, and respond to network attacks Network defence fundamentals
Application of network security controls, protocols, perimeter appliances, secure IDS, VPN, and firewall configuration
Intricacies of network traffic signature, analysis, and vulnerability scanning
Course Intake
1 Jan 2025 → 1 March 2025
2 days | Monday and Thursday | 8PM → 10PM
Content Provider



EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.
EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.
EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.
Module
Expand All +
Pre-Work: Preparatory Lessons
Module Title 1
Module Title 2
Module
Expand All +
Pre-Work: Preparatory Lessons
Module Title 1
Module Title 2