EC-Council Certified Network Defender v2 - CND

51 Bewertung
  • Treuepunkte: 5000
  • Examen-ID: CND 312-38
  • ETC-Seminar-ID: CND
  • Sprache: Deutsch

Beschreibung

Die Ausbildung zum „Certified Network Defender“ (CND) ist ein herstellerneutrales, praktisches und umfassendes Netzwerksicherheit-Zertifizierungsprogramm.

In diesem Labintensiven Seminar, das auf einer Analyse der Aufgabenanforderungen und Maßnahmen zur Internetsicherheit beruht, erlangen Sie alle Fertigkeiten, die Sie in puncto Cybersicherheit benötigen.

Der Kurs basiert auf den Anforderungen von System- und Netzwerkadministratoren des amerikanischen Verteidigungsministerium, wurde aber auch an globale Stellenanforderungen und Verantworlichkeiten ausgerichtet. Konzeption und Ausarbeitung des Kurses erfolgte anhand umfassender Marktforschungen und Umfragen.

Im Rahmen dieses Programms lernen Netzwerkadministratoren Technologien und Vorgänge zur Netzwerksicherheit kennen, die sie auf den Aufbau einer tiefgreifenden Schutzarchitektur für ihre Netzwerke vorbereiten. Dabei wird der Netzwerksicherheitsansatz „Schutz, Erkennung und Reaktion“ behandelt. Der Kurs umfasst praktische Übungen zu den wichtigsten Tools und Techniken zur Netzwerksicherheit. Anhand dieser Übungen erhalten Netzwerkadministratoren praktische Erfahrungen mit aktuellen Netzwerksicherheitstechnologien und -vorgängen.

Das umfassende Lernmaterial enthält bewährte Methoden, Bewertungen und Sicherheitstools zum Schutz von Netzwerken. Außerdem beinhaltet das Material Vorlagen für verschiedene Netzwerkrichtlinien sowie zahlreiche Whitepaper.

Nach Abschluss des Kurses haben die Teilnehmer Kenntnisse zu folgenden Themen:
  • Network Attacks and Defense Strategies
  • Administrative Network Security
  • Technical Network Security
  • Network Perimeter Security
  • Endpoint Security-Windows Systems
  • Endpoint Security-Linux Systems
  • Endpoint Security- Mobile Devices
  • Endpoint Security-IoT Devices
  • Administrative Application Security
  • Data Security
  • Enterprise Virtual Network Security
  • Enterprise Cloud Network Security
  • Enterprise Wireless Network Security
  • Network Traffic Monitoring and Analysis
  • Network Logs Monitoring and Analysis
  • Incident Response and Forensic Investigation
  • Business Continuity and Disaster Recovery
  • Risk Anticipation with Risk Management
  • Threat Assessment with Attack Surface Analysis
  • Threat Prediction with Cyber Threat Intelligence

error_outline Wichtige Information

Dieses Seminar bereitet auf die Prüfung 312-38 CND Exam vor. Testfragen: 100 Testdauer: 4 Stunden Testform: Multiple Choice Testanbieter: EC-Council. Das Examen ist im Kurspreis inkludiert.

expand_more chevron_right Zielgruppe

Dieses Seminar richtet sich an:
  • Network Administrators
  • Network security Administrators
  • Network Security Engineer
  • Network Defense Technicians
  • CND Analyst
  • Security Analyst
  • Security Operator
  • Anyone who involves in network operations

    expand_more chevron_right Vorkenntnisse

    Für dieses Seminar werden folgende Vorkenntnisse empfohlen:
    Grundlegende Kenntnisse von Netzwerkkonzepten. 

    expand_more chevron_right Detail-Inhalte

    Module 01: Network Attacks and Defense Strategies
    • Network security attacks
    • Network-level attack techniques
    • Application-level attack techniques
    • Social engineering attack techniques
    • Email attack techniques
    • Mobile device-specific attack techniques
    • Cloud-specific attack techniques
    • Wireless network-specific attack techniques
    • Attacker’s Hacking Methodologies and Frameworks
    • Fundamental goal, benefits, and challenges in network defense
    • Continual/Adaptive security strategy
    • Defense-in-depth security strategy

    Module 02: Administrative Network Security
    • Obtain compliance with regulatory framework and standards
    • Regulatory Frameworks, Laws, and Acts
    • Design and develop security policies
    • Conduct different type security and awareness training
    • Implement other administrative security measures

    Module 03: Technical Network Security
    • Access control principles, terminologies, and models
    • Redefine the Access Control in Today’s Distributed and Mobile Computing World
    • Identity and Access Management (IAM):
    • Cryptographic security techniques
    • Various cryptographic algorithms
    • Security benefits of network segmentation techniques
    • Essential network security solutions
    • Essential network security protocols

    Module 04: Network Perimeter Security
    • Firewall security concerns, capabilities, and limitations
    • Different types of firewall technologies and their usage
    • Firewall topologies and their usage
    • Distinguish between hardware, software, host, network, internal, and external firewalls
    • Select firewalls based on its deep traffic inspection capability
    • Firewall implementation and deployment process
    • Recommendations and best practices for secure firewall Implementation and deployment
    • Firewall administration concepts
    • Role, capabilities, limitations, and concerns in IDS deployment
    • IDS classification
    • Various components of ID
    • Effective deployment of network and host-based IDS
    • How to deal with false positive and false negative IDS/IPS alerts
    • Considerations for selection of an appropriate IDS/IPS solutions
    • NIDS and HIDS Solutions with their intrusion detection capabilities Snort
    • Router and switch security measures, recommendations, and best practices
    • Leverage Zero Trust Model Security using Software-Defined Perimeter (SDP)

    Module 05: Endpoint Security-Windows Systems
    • Window OS and Security Concerns
    • Windows Security Components
    • Windows Security Features
    • Windows Security Baseline Configurations
    • Windows User Account and Password Management
    • Windows Patch Management
    • User Access Management
    • Windows OS Security Hardening Techniques
    • Windows Active Directory Security Best Practices
    • Windows Network Services and Protocol Security

    Module 06: Endpoint Security-Linux Systems LO#01: Linux OS and security concerns
    • Linux Installation and Patching
    • Linux OS Hardening Techniques
    • Linux User Access and Password Management
    • Linux Network Security and Remote Access
    • Linux Security Tools and Frameworks

    Module 07: Endpoint Security- Mobile Devices
    • Common Mobile Usage Policies in Enterprises
    • Security Risk and Guidelines associated with Enterprises mobile usage policies
    • Implement various enterprise-level mobile security management Solutions
    • Implement general security guidelines and best practices on Mobile platforms
    • Security guidelines and tools for Android devices
    • Security guidelines and tools for iOS devices

    Module 08: Endpoint Security-IoT Devices
    • IoT Devices, their need and Application Areas
    • IoT Ecosystem and Communication models
    • Security Challenges and risks associated with IoT-enabled environments
    • Security in IoT-enabled environments
    • Security Measures for IoT enabled IT Environments
    • IoT Security Tools and Best Practices
    • Refer various standards, Initiatives and Efforts for IoT Security

    Module 09: Administrative Application Security
    • Implement Application Whitelisting and Blacklisting
    • Implement application Sandboxing
    • Implement Application Patch Management
    • Implement Web Application Firewall (WAF)

    Module 10: Data Security
    • Data security and its importance
    • Implementation of data access controls
    • Implementation of Encryption of Data at rest
    • Implementation of Encryption of “Data at transit”
    • Implementation of Encryption of “Data at transit” between browser and web server
    • Implementation of Encryption of “Data at transit” between database server and web server
    • Implementation of Encryption of “Data at transit” in Email Delivery
    • Data Masking Concepts
    • Data backup and retention
    • Data Destruction Concepts
    • Data Loss Prevention Concepts

    Module 11: Enterprise Virtual Network Security
    • Evolution of network and security management concept in modern Virtualized IT Environments
    • Virtualization Essential Concepts
    • Network Virtualization (NV) Security
    • SDN Security
    • Network Function Virtualization (NFV) Security
    • OS Virtualization Security
    • Security Guidelines, Recommendations and Best Practices for Containers
    • Security Guidelines, Recommendations and Best practices for Dockers
    • Security Guidelines, Recommendations and Best Practices for Kubernetes

    Module 12: Enterprise Cloud Security
    • Cloud Computing Fundamentals
    • Insights of Cloud Security
    • Evaluate CSP for Security before Consuming Cloud Service
    • Security in Amazon Cloud (AWS)
    • Security in Microsoft Azure Cloud
    • Security in Google Cloud Platform (GCP)
    • General security best practices and tools for cloud security

    Module 13: Wireless Network Security
    • Wireless network fundamentals

    Module 14: Network Traffic Monitoring and Analysis
    • Need and advantages of network traffic monitoring
    • Setting up the environment for network monitoring
    • Determine baseline traffic signatures for normal and suspicious network traffic
    • Perform network monitoring and analysis for suspicious traffic using Wireshark
    • Network performance and bandwidth monitoring tools and techniques

    Module 15: Network Logs Monitoring and Analysis
    • Logging concepts
    • Log monitoring and analysis on Windows systems
    • Log monitoring and analysis on Linux
    • Log monitoring and analysis on Mac
    • Log monitoring and analysis in Firewall
    • Log monitoring and analysis on Routers
    •  Log monitoring and analysis on Web Servers
    • Centralized log monitoring and analysis

    Module 16: Incident Response and Forensic Investigation
    • Incident response concept
    • Role of first responder in incident response
    • Do’s and Don’t in first response
    • Incident handling and response process
    • Forensics investigation process

    Module 17: Business Continuity and Disaster Recovery
    • Business Continuity (BC) and Disaster Recovery (DR) concepts
    • BC/DR Activities
    • Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP)
    • BC/DR Standards

    Module 18: Risk Anticipation with Risk Management
    • Risk management concepts
    • Manage risk though risk management program
    • Different Risk Management Frameworks (RMF)
    • Manage vulnerabilities through vulnerability management program
    • Vulnerability Assessment and Scanning

    Module 19: Threat Assessment with Attack Surface Analysis
    • Attack surface concepts
    • Understand and visualize your attack surface
    • Identify Indicators of Exposures (IoE)
    • Perform attack simulation
    • Reduce the attack surface
    • Attack surface analysis specific to Cloud and IoT

    Module 20: Threat Prediction with Cyber Threat Intelligence
    • Role of cyber threat intelligence in network defense
    • Types of threat Intelligence
    • Indicators of Threat Intelligence: Indicators of Compromise (IoCs) and Indicators of Attack (IoA)
    • Layers of Threat Intelligence
    • Leverage/consume threat intelligence for proactive defense
    • expand_more chevron_right event_available 13.12.-17.12.2021 13.12.2021 verified_user Termingarantie Seminarzeitentimer5 Tage roomETC-Wien Als Live-Stream verfügbaronline_predictionLive-Stream
      • expand_more chevron_right ETC Live - Virtual Classroom 3.700,00
        • Virtual Training – aber live im Seminar
        • Keine Anfahrt ins Seminarzentrum notwendig
        • Seminarunterlagen, Teamwork, Labs 24/7
        • ETC>Live Support und Hotline
        • ETC-Services

         

      • expand_more chevron_right Black Friday Skills Sale 3.325,00
        • Special Pricing – nur bis 3.12. online buchbar
        • Virtual Training – aber live mit allen Services im Seminar
        • Seminarunterlagen, Teamwork, Labs 24/7
        • ETC>Live  Support und Hotline
        • ETC-Services
        • weitere  Black Friday Skills Sale Angebote
      • expand_more chevron_right ETC Classroom - im Seminarzentrum 3.700,00
        • Ihr ILT Seminar (Instructor Led Training)
        • Seminarunterlagen, Teamwork, Labs
        • Verpflegung vorort
        • Seminar-Services
    • expand_more chevron_right event_available 07.02.-11.02.2022 07.02.2022 Seminarzeitentimer5 Tage roomETC-Wien Als Live-Stream verfügbaronline_predictionLive-Stream
      • expand_more chevron_right ETC Live - Virtual Classroom 3.700,00
        • Virtual Training – aber live im Seminar
        • Keine Anfahrt ins Seminarzentrum notwendig
        • Seminarunterlagen, Teamwork, Labs 24/7
        • ETC>Live Support und Hotline
        • ETC-Services

         

      • expand_more chevron_right ETC Classroom - im Seminarzentrum 3.700,00
        • Ihr ILT Seminar (Instructor Led Training)
        • Seminarunterlagen, Teamwork, Labs
        • Verpflegung vorort
        • Seminar-Services
    • expand_more chevron_right event_available 30.05.-03.06.2022 30.05.2022 Seminarzeitentimer5 Tage roomETC-Wien Als Live-Stream verfügbaronline_predictionLive-Stream
      • expand_more chevron_right ETC Live - Virtual Classroom 3.700,00
        • Virtual Training – aber live im Seminar
        • Keine Anfahrt ins Seminarzentrum notwendig
        • Seminarunterlagen, Teamwork, Labs 24/7
        • ETC>Live Support und Hotline
        • ETC-Services

         

      • expand_more chevron_right ETC Classroom - im Seminarzentrum 3.700,00
        • Ihr ILT Seminar (Instructor Led Training)
        • Seminarunterlagen, Teamwork, Labs
        • Verpflegung vorort
        • Seminar-Services
    • expand_more chevron_right event_available 17.10.-21.10.2022 17.10.2022 Seminarzeitentimer5 Tage roomETC-Wien Als Live-Stream verfügbaronline_predictionLive-Stream
      • expand_more chevron_right ETC Live - Virtual Classroom 3.700,00
        • Virtual Training – aber live im Seminar
        • Keine Anfahrt ins Seminarzentrum notwendig
        • Seminarunterlagen, Teamwork, Labs 24/7
        • ETC>Live Support und Hotline
        • ETC-Services

         

      • expand_more chevron_right ETC Classroom - im Seminarzentrum 3.700,00
        • Ihr ILT Seminar (Instructor Led Training)
        • Seminarunterlagen, Teamwork, Labs
        • Verpflegung vorort
        • Seminar-Services

    Ähnliche Seminare