Course Description

The Certified Network Defender (CNDv2) certification program focuses on training Network Administrators to protect, detect, respond to, and predict threats on the network. This builds upon the typical knowledge and skills of Network Administrators in network components, traffic, performance and utilization, network topology, system locations and security policies.

The only true blue team network defense program!

Cybersecurity now dominates the priorities of every enterprise striving to adapt to a post-COVID world. Forced to go remote, their workers’ identities and devices are the new security perimeter. In fact, cybersecurity for business is now as critical as internet access itself.

The only program built for the world’s largest work-from-home experiment!

Studies and news reports had demonstrated that cyber attackers are quick to attack the new, unprotected threat surfaces created when millions of employees started working from home. Providing network security to such an unprecedented, distributed ecosystem in this post- pandemic world is every Network Defense Team’s acid test.

Network Administrator, Network Engineer, Network Security Administrator/Engineer/Analyst, Cybersecurity Engineer, Security Analyst/Operator, Network Defense Technician

5 days
Minimum 40 hours

Exam title: Certified Network Defender

Number of questions: 100

Duration: 4 hours

Core: CND

Advanced: C|EH (Certified Ethical Hacker) (ANSI and Practical)

Expert:  CPENT, LPT (Master)

What's in the new CNDv2? Focus on BCP&DRP Hands-on approach Latest technologies

Adaptive Security Strategy

CND v2 includes the Adaptive Security Strategy, thereby increasing the scope from Protect – Detect – Respond to Protect – Detect – Respond – Predict.

Enhanced Focus on Cloud Security

Candidates will learn different ways to ensure security across various cloud platforms - AWS, Microsoft Azure Cloud, and Google Cloud Platform.

Increased Lab Time and Hands-On Focus

More than 50% of the CND v2 program is dedicated to practical skills in live ranges via EC-Council labs.

An Introduction to Threat Intelligence

CNDv2 helps you take a more effective, proactive approach using threat intelligence.

A Dedicated Module on IoT Security

CND v2 introduces candidates to the various challenges that IoT devices pose and the measures required to mitigate them.

In−Depth Attack Surface Analysis

CNDv2 trains you to identify what parts of your organization need to be reviewed and tested for security vulnerabilities, and how to reduce, prevent, and mitigate network risks.

Network Virtualization Practices for the Remote Workforce

The CND v2 program teaches candidates to implement and manage the security of virtualization technologies Containers, Dockers, Kubernetes used in modern-day networks.

Includes the Latest Technology

CND v2 covers the latest technologies such as Software Defined Network (SDN) security, Network Function Virtualization (NFV) security, container security, docker security, and Kubernetes security.

An Upgrade on Mobile Security Measures

With the CND v2, you will learn Enterprise Mobile Device Security, Redefine Access Control Security, and other platforms to ensure that this endpoint remains secure.

Increased Lab Time and Hands−on Focus

More than 50% of the CEH v11 course is dedicated to practical skills in live ranges via EC-Council labs. EC-Council leads in this aspect of the industry.

Course outline

► Network Attacks and Defense Strategies

► Administrative Network Security

► Technical Network Security

► Network Perimeter Security

► Endpoint Security-Windows Systems

► Endpoint Security-Linux Systems
► Endpoint Security- Mobile Devices
► Endpoint Security-IoT Devices

► Administrative Application Security

► Data Security

► Enterprise Virtual Network Security

► Enterprise Cloud Network Security

► Enterprise Wireless Network Security

► Network Traffic Monitoring and Analysis

► Network Logs Monitoring and Analysis

► Incident Response and Forensic Investigation

► Business Continuity and Disaster Recovery

► Risk Anticipation with Risk Management

► Threat Assessment with Attack Surface Analysis

► Threat Prediction with Cyber Threat Intelligence

Contact us!