Certified Network Defender (C|ND v3) is an essential vendor-neutral network security certification for every IT and systems administrator who needs to operate with a secure mindset.
Students will learn the critical skills required to defend their networks and operating environments across local networks, endpoints, cloud infrastructure, applications, OT, and mobile.
They will also acquire knowledge of effective proper log analysis, network traffic monitoring, basic
investigation and response, as well as business continuity and disaster recovery.
Additionally, they will dive into threats, analyzing the attack surface, and studying threat prediction and threat intelligence as it relates to their administration and defense responsibilities.
Often referred to as blue-teaming, Certified Network Defenders (C|NDs) will be able to apply defense and countermeasure strategies in their organizations, playing a critical role not only in attack prevention but also in detection, response, and remediation as they configure networks and systems to operate securely.
The C|ND v3 program will cover the concepts and fortify skills through hands-on practice across over 100+ labs delivered on live target machines.
The C|ND v3 program designed by industry experts prepares network defenders with strategic, technological, and operational network security capabilities, enabling them to design, develop, and
maintain secure networks.
-
-
Module 1: Network Attacks and Defense Strategies
-
Module 2: Administrative Network Security
-
Module 3: Technical Network Security
-
Module 4: Network Perimeter Security
-
Module 5: Endpoint Security – Windows Systems
-
Module 6: Endpoint Security – Linux Systems
-
Module 7: Endpoint Security – Mobile Devices
-
Module 8: Endpoint Security – IoT Devices
-
Module 9: Administrative Application Security
-
Module 10: Data Security
-
Module 11: Enterprise Virtual Network Security
-
Module 12: Enterprise Cloud Network Security
-
Module 13: Enterprise Wireless Network Security
-
Module 14: Network Traffic Monitoring and Analysis
-
Module 15: Network Traffic Monitoring and Analysis
-
Module 16: Incident Response and Forensic Investigation
-
Module 17: Business Continuity and Disaster Recovery
-
Module 18: Risk Anticipation with Risk Management
-
Module 19: Threat Assessment with Attack Surface Analysis
-
Module 20: Threat Assessment with Attack Surface Analysis
-