Certified Network Defender
Certified Network Defender
Certified Network Defender

Certified Network Defender

A comprehensive program that covers 14 of the most current network security domains needed for planning to protect, detect, and respond to the network attacks.

Ideal For

This program is designed for beginners and does not have any mandatory prerequisites. However, it is recommended that individuals who possess a basic understanding of networking concepts consider taking Certified Network Defender v2.

This program is designed for beginners and does not have any mandatory prerequisites. However, it is recommended that individuals who possess a basic understanding of networking concepts consider taking Certified Network Defender v2.

This program is designed for beginners and does not have any mandatory prerequisites. However, it is recommended that individuals who possess a basic understanding of networking concepts consider taking Certified Network Defender v2.

What to Expect

SKILL LEVEL
Beginner
DURATION
3 Months
CERTIFICATION
After Completion
LANGUAGE
English

Skills You Will Learn

  • Network Attacks and Defence Strategies

  • Administrative Network Security

  • Technical Network Security

  • Network Perimeter Security

  • Endpoint Security-Windows Systems

  • Endpoint Security-Linux Systems

  • Endpoint Security- Mobile Devices

  • Endpoint Security-loT Devices

  • Administrative Application Security

  • Data Security

  • Network Attacks and Defence Strategies

  • Administrative Network Security

  • Technical Network Security

  • Network Perimeter Security

  • Endpoint Security-Windows Systems

  • Endpoint Security-Linux Systems

  • Endpoint Security- Mobile Devices

  • Endpoint Security-loT Devices

  • Administrative Application Security

  • Data Security

  • Network Attacks and Defence Strategies

  • Administrative Network Security

  • Technical Network Security

  • Network Perimeter Security

  • Endpoint Security-Windows Systems

  • Endpoint Security-Linux Systems

  • Endpoint Security- Mobile Devices

  • Endpoint Security-loT Devices

  • Administrative Application Security

  • Data Security

  • Enterprise Virtual Network Security

  • Enterprise Cloud Network Security

  • Enterprise Wireless Network Security

  • Network Traffic Monitoring and Analysis

  • Network Logs Monitoring and Analysis

  • Incident Response and Forensic Investigation

  • And more!

  • Enterprise Virtual Network Security

  • Enterprise Cloud Network Security

  • Enterprise Wireless Network Security

  • Network Traffic Monitoring and Analysis

  • Network Logs Monitoring and Analysis

  • Incident Response and Forensic Investigation

  • And more!

  • Enterprise Virtual Network Security

  • Enterprise Cloud Network Security

  • Enterprise Wireless Network Security

  • Network Traffic Monitoring and Analysis

  • Network Logs Monitoring and Analysis

  • Incident Response and Forensic Investigation

  • And more!

Module

Expand All +

Pre-Work: Preparatory Lessons

Module Title 1

Module Title 2

Module

Expand All +

Pre-Work: Preparatory Lessons

Module Title 1

Module Title 2

Course Outcome

  • Knowledge on how to protect, detect, and respond to network attacks Network defence fundamentals

  • Application of network security controls, protocols, perimeter appliances, secure IDS, VPN, and firewall configuration

  • Intricacies of network traffic signature, analysis, and vulnerability scanning

  • Knowledge on how to protect, detect, and respond to network attacks Network defence fundamentals

  • Application of network security controls, protocols, perimeter appliances, secure IDS, VPN, and firewall configuration

  • Intricacies of network traffic signature, analysis, and vulnerability scanning

  • Knowledge on how to protect, detect, and respond to network attacks Network defence fundamentals

  • Application of network security controls, protocols, perimeter appliances, secure IDS, VPN, and firewall configuration

  • Intricacies of network traffic signature, analysis, and vulnerability scanning

Course Intake

1 Jan 2025 → 1 March 2025

2 days | Monday and Thursday | 8PM → 10PM

Content Provider

EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.

EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.

EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.

Module

Expand All +

Pre-Work: Preparatory Lessons

Module Title 1

Module Title 2

Module

Expand All +

Pre-Work: Preparatory Lessons

Module Title 1

Module Title 2