Certified Network Defender
Certified Network Defender
Certified Network Defender

Certified Network Defender

A comprehensive program that covers 14 of the most current network security domains needed for planning to protect, detect, and respond to the network attacks.

This Course Is Ideal For

This program is designed for beginners and does not have any mandatory prerequisites. However, it is recommended that individuals who possess a basic understanding of networking concepts consider taking Certified Network Defender v2.

This program is designed for beginners and does not have any mandatory prerequisites. However, it is recommended that individuals who possess a basic understanding of networking concepts consider taking Certified Network Defender v2.

This program is designed for beginners and does not have any mandatory prerequisites. However, it is recommended that individuals who possess a basic understanding of networking concepts consider taking Certified Network Defender v2.

What to Expect In This Course

SKILL LEVEL
Beginner
DURATION
3 Months
CERTIFICATION
After Completion
LANGUAGE
English

Skill You Will Learn

  • Network Attacks and Defence Strategies

  • Administrative Network Security

  • Technical Network Security

  • Network Perimeter Security

  • Endpoint Security-Windows Systems

  • Endpoint Security-Linux Systems

  • Endpoint Security- Mobile Devices

  • Endpoint Security-loT Devices

  • Administrative Application Security

  • Data Security

  • Network Attacks and Defence Strategies

  • Administrative Network Security

  • Technical Network Security

  • Network Perimeter Security

  • Endpoint Security-Windows Systems

  • Endpoint Security-Linux Systems

  • Endpoint Security- Mobile Devices

  • Endpoint Security-loT Devices

  • Administrative Application Security

  • Data Security

  • Network Attacks and Defence Strategies

  • Administrative Network Security

  • Technical Network Security

  • Network Perimeter Security

  • Endpoint Security-Windows Systems

  • Endpoint Security-Linux Systems

  • Endpoint Security- Mobile Devices

  • Endpoint Security-loT Devices

  • Administrative Application Security

  • Data Security

Programme Module

Pre-Work: Preparatory Lessons

Module Title 1

Module Title 2

Programme Module

Pre-Work: Preparatory Lessons

Module Title 1

Module Title 2

Outcomes of the Course

  • Knowledge on how to protect, detect, and respond to network attacks Network defence fundamentals

  • Application of network security controls, protocols, perimeter appliances, secure IDS, VPN, and firewall configuration

  • Intricacies of network traffic signature, analysis, and vulnerability scanning

  • Knowledge on how to protect, detect, and respond to network attacks Network defence fundamentals

  • Application of network security controls, protocols, perimeter appliances, secure IDS, VPN, and firewall configuration

  • Intricacies of network traffic signature, analysis, and vulnerability scanning

  • Knowledge on how to protect, detect, and respond to network attacks Network defence fundamentals

  • Application of network security controls, protocols, perimeter appliances, secure IDS, VPN, and firewall configuration

  • Intricacies of network traffic signature, analysis, and vulnerability scanning

Course Intake

1 Jan 2025 → 1 March 2025

2 days | Monday and Thursday | 8PM → 10PM

Content Provider

EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.

EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.

EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.

Programme Module

Pre-Work: Preparatory Lessons

Module Title 1

Module Title 2

Programme Module

Pre-Work: Preparatory Lessons

Module Title 1

Module Title 2