What is Certified Network Defender Certification?
The Certified Network Defender (CND) Certification is designed to equip cyber security professionals with the skills to protect networks from intrusions, attacks, and vulnerabilities. This certification is crucial for safeguarding information systems and ensuring operational continuity by addressing potential cyber threats.
The CND Course is ideal for IT professionals, Network Administrators, and Cyber Security Analysts aiming to strengthen their expertise in detecting, protecting against, and responding to network threats. It is also highly beneficial for Network Engineers and Security Consultants seeking advanced knowledge in network defence strategies.
Oakwood International’s 5-day Certified Network Defender Certification Course provides learners with practical skills in network defence, including implementing secure architectures and managing security policies. The course covers key topics, such as securing endpoint devices, and managing cloud and virtual network environments, ensuring comprehensive training for today’s cyber security challenges.
Course Objectives
Identify network vulnerabilities and implement effective defence strategies
- Secure endpoints, mobile devices, and IoT environments against threats
- Deploy and maintain robust network perimeter defences
- Monitor network activity and analyse security logs to detect threats
- Respond to and recover from network security incidents efficiently
- Apply risk management principles to mitigate cyber threats
Upon completing the Certified Network Defender Certification, learners will be skilled in monitoring, detecting, and responding to threats, managing cyber risks, and ensuring regulatory compliance.
Course Outline
Certified Network Defender Certification
Module 1: Network Attacks and Defence Strategies
Attack
Threat
Threat Sources
Threat Actors
Vulnerability
Risk
Network Attacks
Application Attacks
Social Engineering Attacks
Email Attacks
Mobile Attacks
Cloud Attacks
Supply Chain Attacks
Wireless Attacks
Hacking Methodologies and Frameworks
Adaptive Security Strategy
Defence-in-depth Security
Module 2: Administrative Network Security
Compliance
Regulatory Frameworks
Security Policies
Security Awareness
Asset Management
Recent Cybersecurity Trends
Module 3: Technical Network Security
Access Controls
Authentication
Authorisation
Accounting (AAA)
IAM
Cryptography
Network Segmentation
Zero Trust
Network Security Controls
Network Security Protocols
Module 4: Network Perimeter Security
Firewalls
Firewall Types
Firewall Topologies
Firewall Selection
Firewall Implementation and Deployment
Firewall Administration
IDS/IPS
IDS/IPS Classification
IDS/IPS Selection
False Positives
False Negatives
Router Security
Switch Security
Software-defined Perimeter (SDP)
Module 5: Endpoint Security-Windows Systems
Windows Security Risks
Windows Security Components
Windows Security Features
Windows Security Baseline Configurations
User Account and Password Management
Windows Patch Management
Windows User Access Management
Active Directory Security
Windows Network Services and Protocol Security
Windows Security Best Practices
Module 6: Endpoint Security-Linux Systems
Linux Security Risks
Linux Installation and Patching
Linux User Access and Password Management
Linux OS Hardening Techniques
Linux Network and Remote Access Security
Linux Security Tools and Frameworks
Module 7: Endpoint Security- Mobile Devices
Bring Your Own Device (BYOD)
Choose Your Own Device (CYOD)
Corporate Owned, Personally Enabled (COPE)
Company Owned, Business Only (COBO)
Mobile Device Management (MDM)
Mobile Application Management (MAM)
Mobile Threat Defence (MTD)
Unified Endpoint Management (UEM)
Mobile Email Management (MEM)
Mobile Content Management (MCM)
Enterprise Mobility Management (EMM)
Mobile Device Security
Android Security
iPhone Security
Module 8: Endpoint Security-IoT Devices
IoT Devices
IoT Application Areas
IoT Ecosystem
IoT Communication Models
IoT-Enabled Environments
IoT Security Risk and Challenges
IoT Security in IoT-Enabled IT Environments
IoT Security Tools
IoT Security Best Practices
IoT Security Standards, Initiatives, and Efforts
Module 9: Administrative Application Security
Application Whitelisting
Application Blacklisting
Application Sandboxing
Application Patch Management
Web Application Firewalls (WAFs)
Module 10: Data Security
Data Security
Data Encryption Data at Rest
Data Encryption at Transit
Data Masking
Data Backup
Data Retention
Data Destruction
Data Loss Prevention (DLP)
Data Integrity
Module 11: Enterprise Virtual Network Security
Network Virtualisation (NV)
Software-defined Network (SDN)
Network Function Virtualisation (NFV) Security
OS Virtualisation Security
Container Security
Docker Security
Kubernetes Security
Module 12: Enterprise Cloud Network Security
Cloud Computing
Cloud Security
Shared Responsibility Model
Amazon Cloud (AWS) Security
Microsoft Azure Cloud Security
Google Cloud Platform (GCP) Security
Module 13: Enterprise Wireless Network Security
Wireless Network
Wireless Standards
Wireless Topologies
Wireless Network Components
Wireless Network Encryption
Wireless Network Authentication
Wireless Network Security Measures
Wi-Fi Security Tools
Module 14: Network Traffic Monitoring and Analysis
Network Traffic Monitoring
Baseline Traffic Signatures
Suspicious Network Traffic Signatures
Threat Detection with Wireshark
Bandwidth Monitoring
Performance Monitoring
Network Anomaly Detection
Behaviour Analysis
Module 15: Network Logs Monitoring and Analysis
Logs
Windows Log Analysis
Linux Log Analysis
Mac Log Analysis
Firewall Log Analysis
Router Log Analysis
Web Server Log Analysis
Centralised Log Management
Module 16: Incident Response and Forensic Investigation
First Responder
Incident Handling and Response Process
SOAR
Endpoint Detection and Response (EDR)
Extended Detection and Response (XDR)
Forensics Investigation
Module 17: Business Continuity and Disaster Recovery
Business Continuity (BC)
Disaster Recovery (DR)
Business Continuity Management (BCM)
BC/DR Activities
Business Impact Analysis (BIA)
Recovery Time Objective (RTO)
Recovery Point Objective (RPO)
Business Continuity Plan (BCP)
Disaster Recovery Plan (DRP)
Module 18: Risk Anticipation with Risk Management
Risk Management
Risk Identification
Risk Assessment
Risk Treatment
Risk Treatment Steps
Risk Tracking and Review
Risk Management Frameworks (RMFs)
Vulnerability Management
Vulnerability Scanning
Vulnerability Reporting
Privacy Impact Assessment (PIA)
Module 19: Threat Assessment with Attack Surface Analysis
Attack Surface
Attack Surface Analysis
System Attack Surface
Network Attack Surface
Software Attack Surface
Physical Attack Surface
Human Attack Surface
Indicators of Exposures (IoEs)
Attack Simulation
Attack Surface Reduction
Attack Surface Monitoring Tools
Cloud and IoT Attack Surface Analysis
Module 20: Threat Prediction with Cyber Threat Intelligence
Cyber Threat Intelligence
Threat Intelligence Types
Indicators of Compromise (IoCs)
Indicators of Attack (IoA)
Threat Intelligence Layers
Threat Intelligence Sources
Threat Intelligence Feeds
Threat Intelligence Platforms (TIP)
Threat Hunting
Included
Included
- No course includes are available.
Offered In This Course:
-
Video Content
-
eLearning Materials
-
Study Resources
-
Completion Certificate
-
Tutor Support
-
Interactive Quizzes
Learning Options
Discover a range of flexible learning options designed to meet your needs. Select the format that best supports your personal growth and goals.
Online Instructor-Led Training
- Live virtual classes led by experienced trainers, offering real-time interaction and guidance for optimal learning outcomes.
Online Self-Paced Training
- Flexible learning at your own pace, with access to comprehensive course materials and resources available anytime, anywhere.
Build your future with Oakwood International
We empower you with the skills, knowledge, and confidence to excel in your career. Join us and take the first step towards realising your professional goals.
Frequently Asked Questions
Q. What is the Certified Network Defender Certification?
The Certified Network Defender
Certification trains IT professionals to protect networks, detect threats, and
manage cyber security risks effectively.
Q. Who should attend this course?
This course is ideal for IT
Professionals, Network Administrators, Cyber Security Analysts, Security
Consultants, and Network Engineers who want to improve their network security
skills.
Q. Why is network security important?
Securing networks is essential to protect
data, maintain operations, and prevent disruptions caused by cyber threats.
Q. What are the benefits of this course?
This course helps you identify
network vulnerabilities, respond to threats, and apply security strategies,
boosting your skills and career opportunities.
Q. What certification will I receive?
You’ll earn the Certified Network
Defender Certification, proving your ability to secure networks and manage
cyber risks.