Course Description
Course Overview
Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE).
The program prepares network administrators on network security technologies and operations to attain Defense-in-Depth network security preparedness. It covers the protect, detect and respond approach to network security. The course contains hands-on labs, based on major network security tools and techniques which will provide network administrators real world expertise on current network security technologies and operations.
Objectives
After successfully completing this course, students should be able to:
- Understand and apply Information Assurance (IA) Compliance measures
- Understand, design, and build systems security architecture
- Participate in technology research and development
- Participate in systems requirements planning
- Conduct test and evaluation
- Participate in systems development
- Provide network security technical support
- Operate and maintain network services
- Conduct systems security analysis
- Design, maintain, and support Computer Network Defense (CND) Infrastructure
- Conduct and participate in Cyber Operations planning
Target Audience
This program is intended to immerse a typical network or systems administrator in the world of hackers and cyber defense. The training and certification are recommended for operations personnel who although do not have security as their primary job function, need an understanding of cyber security core principles and practices including:
- Network Administrators
- Network Security Administrators
- Network Security Engineer
- Network Defense Technicians
- CND Analyst
- Security Analyst
- Security Operator
- Anyone involved in Network Operations
Course Outline
Module 1: Computer Network Defense Fundamentals
Module 2: Network Security Threats, Vulnerabilities, and Attacks
Module 3: Network Security Controls, Protocols, and Perimeter Appliances
Module 4: Secure Firewall Configuration, Deployment, and Management
Module 5: Secure IDS Configuration and Management
Module 6: Secure VPN Configuration and Management
Module 7: Designing a Secure Network
Module 8: Network Traffic Signatures and Analysis
Module 9: Monitoring and Securing Network Traffic
Module 10: Network Vulnerability Scanning
Module 11: Host/System Security
Module 12: Physical Security
Module 13: Designing and Implementation of Network Security Policies
Module 14: Network Incident Response and Management
Module 15: Network Backup and Disaster Recovery
Module 16: Wireless Network Defense