Course Overview
TOPEC-Council's Certified Network Defender (C|ND) is an essential vendor-neutral network security certification for every IT and systems administrator who needs to operate with a secure mindset.
Students will learn the critical skills required to defend their networks and operating environments across local networks, endpoints, cloud infrastructure, applications, OT, and Mobile. They will also acquire knowledge of effective proper log analysis, network traffic monitoring, basic investigation and response, as well as business continuity and disaster recovery.
Additionally, they will dive into threats, analyzing the attack surface, and studying threat prediction and threat intelligence as it relates to their administration and defense responsibilities.
Often referred to as blue-teaming, C|NDs will be able to apply defense and countermeasure strategies in their organizations, playing a critical role not only in attack prevention but also in detection, response, and remediation as they configure networks and systems to operate securely. The C|ND program will cover the concepts and fortify skills through hands-on practice across over 100+ labs delivered on live target machines.
The C|ND v3 program designed by industry experts prepares network defenders with strategic, technological, and operational network security capabilities, enabling them to design, develop, and maintain secure networks.
This course includes one exam voucher for the CND - Certified Network Defender exam (312-38).
Scheduled Classes
TOPOutline
TOP- Network Attacks and Defense Strategies
- Administrative Network Security
- Technical Network Security
- Network Perimeter Security
- Endpoint Security - Windows Systems
- Endpoint Security - Linux Systems
- Endpoint Security - Mobile Devices
- Endpoint Security - IoT Devices
- Administrative Application Security
- Data Security
- Enterprise Virtual Network Security
- Enterprise Cloud Network Security
- Enterprise Wireless Network Security
- Network Traffic Monitoring and Analysis
- Network Logs Monitoring and Analysis
- Incident Response and Forensic Investigation
- Business Continuity and Disaster Recovery
- Risk Anticipation with Risk Management
- Threat Assessment with Attack Surface Analysis
- Threat Prediction with Cyber Threat Intelligence
Prerequisites
TOPYou should be well-versed in cyber security fundamentals.
Who Should Attend
TOP- System administrators
- System engineers
- Firewall administrators
- Network managers
- IT managers
- IT professionals
- Anyone interested in network security technologies
- Managers who want to understand cyber security core principles and practices
- Operations personnel, who although do not have security as their primary job function, will need an understanding of cyber security core principles and practices