CND is a skill-based network security program which works on cybersecurity education network. The course is constructed aiming at providing job opportunities and also the Department of Defense (DoD) jobs in network administrations.
Provides training to network administrators for protecting, configuring, and coming up with solutions to the threats in network.
Get expertise in understanding networking and defense fundamentals.
Optimize your career opportunities in the field of network & cyber security.
What you’ll master?
Computer Network and Defense Fundamentals Response & Handling.
Network Security Threats & Vulnerabilities.
Physical Security & Host Security.
Secure Firewall Configuration and Management.
Network Traffic Monitoring and Analysis.
Some Sample Videos:
Class:1- Getting started with Certified Network Defender (CND).
Class:2- Basics of Network Fundamentals and Components.
Class:3- Overview of TCP/IP Networking and Basics Protocol Stack.
Class:4 - Understanding IP Addressing.
Class:5 - Learn Computer Network Defense (CND Triad/CND Process /CND Actions/CND Approaches)
Class: 6 - Know about essential Terminologies
Class:7 - A study about Network Security Concerns.
Class: 8 - Network Security Vulnerabilities tutorial.
Class:9 - Network Reconnaissance Attacks overview.
Class: 10 - Learn about network Access Attacks.
Class: 11 - Introduction of Denial of Service (DoS) Attacks and Distributed Denial-of-Service Attack (DDoS)
Class: 12 - An advanced tutorial about Malware Attacks.
Class: 13 - Know about the basic elements of Network Security.
Class: 14 - Understand the Network Security Controls.
Class: 15 - Session on different concepts (User Identification, Authentication, Authorization, and Accounting)
Class: 16 - Tutorial on different types of Authorization Systems.
Class: 17 - Fundamentals of Authorization Principles.
Class: 18 - Overview of Cryptography
Class: 19 - Security Policy basics.
Class: 20 - Session about different Network security devices.
Class:21 - Understanding different Network Security Protocols.
Class:22 - An advanced tutorial about Security Policy.
Class:23 - Know about Internet Access Policies.
Class:24 - Different types of policy (Part- 1)
Class:25 - Different types of policy (Part- 2)
Class:26 - A complete analysis of Physical Security.
Class: 27 - Know about access control authentication.
Class: 28 - Tutorial on Physical Security Controls.
Class: 29 - Important Physical Security Measures.
Class: 30 - Environmental Controls overview.
Class:31 - Host Security fundamentals.
Class:32 - OS Security explanation.
Class:33 - Introduction of Windows Security.
Class:34 - Lesson on Patch Management.
Class:35 - How to Protect from viruses and spyware?
Class:36 - Learn about Linux Security.
Class:37 - Lesson on Securing Network Servers.
Class: 38 - Lesson on Hardening Routers and Switches.
Class: 39 - Fundamentals of Application Security and Data Security.
Class: 40 - Basics of Virtualization Security.
Class: 41 - Introduction of Firewalls and Concern.
Class: 42 - Different types of Firewall and Firewall Technologies.
Class: 43 - About Firewall Topologies and Firewall Rule Set & Policies.
Class: 44 - Session on Firewall Implementation and Administration.
Class: 45 - Introduction of Intrusions and IDPs.
Class: 46 - Different types of IDS Implementation and IDS Deployment Strategies.
Class: 47 - Learn different terms in IPS.
Class: 48 - Session on Network-Based IPS, Host-Based IPS, and Wireless IPS.
Class: 49 - About IDS Counterparts.
Class:50 - Introduction of Virtual Private Network (VPN).
Class:51 - Basics of VPN Technologies and VPN Topologies.
Class:52 - Understand Common VPN Flaws and VPN Security.
Class:53 - Understanding the Quality Of Service and Performance in VPNs.
Class:54 - Introduction of Wireless Terminologies and Networks.
Class:55 - Fundamentals of Wireless Standard and Wireless Topologies.
Class:56 - Understand the Components of Wireless Network.
Class:57 - Understanding all types of Authentication (WEP vs WPA vs. WPA2)
Class: 58 - Tutorial on threats in Wireless Network.
Class: 59 - Bluetooth Threats Intro.
Class: 60 - Different Wireless Network Security.
Class:61- Lesson on Wi-Fi Discovery Tools.
Class:62- Other important tools (Wi-Fi Security Auditing tool, WPA Security Assessment tool, Wi-Fi Vulnerability Scanning tools, WIPS tool)
Class:63- How to monitor and analyze Network Traffic?
Class:64- Know about Network Monitoring.
Class:65 - Lesson on Network Traffic Signatures.
Class: 66 - Overview of different detecting attempts.
Class:67 - Fundamentals of Bandwidth Monitoring.
Class:68 - Risk Levels and Risk Matrix tutorial.
Class:69 - Enterprise Network Risk Management(ERM) overview.
Class: 70 - Lesson on Vulnerability Management.
Class: 71 - Data Backup Intro.
Class: 72 - RAID Technology explanation.
Class: 73 - Introduction of Storage Area Network (SAN).
Class: 74 - Lesson on Network Attached Storage (NAS).
Class: 75 - How to select an appropriate Backup Method?
Class: 76 - How to choose the right location for Backup?
Class: 77 - Session on different types of Backup.
Class: 78 - Session about RAID Data Recovery Services, SAN Data Recovery Software, and NAS Data Recovery Services.
Class:79 - Tutorial on Incident Handling and Response.
Class:80 - Process of Incident Handling and Response.
Class:81 - Outline of IH & R Process Flow.
Class:82 - How to prepare for Incident Handling and Response?
Class:83 - Process of Detection and Analysis.
Class:84 - About Classification and Prioritization.
Class:85 - Incident Containment Explanation.
Class:86 -Session on Forensic Investigation
Class: 87 - Introduction of Eradication and Recovery.
Class: 88 - Incident Documentation tutorial.
Class: 89 - Incident Damage and Cost Assessment tutorial.
Class: 90 - Session about awareness.
Schedule Your Classes
The duration of the Course is 3 Months (90 days)
Weekdays - Monday to Saturday.
Weekend classes - Saturday and Sunday.
Class Consist of both Theory and Practical session.
Materials will be provided.
Please note that the Training Structure may vary for every student.
Have a Question?
Please send us any questions you may have. We would love to answer it.