CyberProtex
  • SERVICES
    • mssp
    • Managed Services >
      • Security Operations Center >
        • Endpoint Protection
      • Operational Technology
      • Tabletop Exercises
      • Continuous Monitoring
    • Security and Compliance >
      • NIST 800-171 Assessments
      • CMMC Assessments
      • Incident Response
      • Penetration Testing
      • Vulnerability Assessments
      • Phishing Simulations
  • SOFTWARE
    • Azure Migrations >
      • Azure Security and Federation
      • Identity and Access Management
    • Dynamics 365
    • SQL Management
    • DevSecOps
    • Application Security
    • Software Products >
      • Vulnerability Genius Software
      • eMASS Simulator Software
      • ICS - SCADA Simulations
      • CyberLMS Software
  • Training
    • Certification >
      • Most Popular Certifications >
        • COMPTIA SECURITY+
        • CEH
        • CISM
        • ISC2-CISSP
        • CLOUD COMPUTING
        • AGILE AND SCRUM
        • ARTIFICAL INTELLIGENCE
        • DEVOPS
      • Cybersecurity Certifications >
        • ISC2-CC
        • ISC2-SSCP
        • ISC2-CGRC
        • ISC2-CSSLP
        • ISC2-ISSAP
        • ISC2-ISSEP
        • ISC2-ISSMP
        • ISACA-CISA
        • COMPTIA CASP+
        • COMPTIA CLOUD ESSENTIALS+
        • COMPTIA CLOUDNETX
        • COMPTIA DATA+
        • COMPTIA DATASYS+
        • COMPTIA DATAX
        • COMPTIA NETWORK+
        • COMPTIA PENTEST+
        • ISC2-CISSP
        • COMPTIA SECURITY+
        • COMPTIA SECURITYX
        • CEH
        • COMPTIA LINUX+
        • CISM
        • COMPTIA CYSA+
        • ISC2-CCSP
        • COMPTIA CLOUD+
        • COMPTIA A+
      • Microsoft Certifications >
        • SC-100
        • SC-200
        • AZ-500
        • SC-900
        • AZ-900
        • MS-900
        • PL-900
      • TOPICS >
        • CYBERSECURITY
        • CLOUD COMPUTING
        • ARTIFICAL INTELLIGENCE
        • VIRTUALIZATION
        • DEVOPS
        • AGILE AND SCRUM
      • BRANDS >
        • ISC2
        • COMPTIA
        • MICROSOFT
        • EC|COUNCIL
        • ISACA
        • AWS
        • CISCO
        • RED HAT
        • VMWARE
    • CMMC Workshop
    • Tabletop Exercises
    • ICS - SCADA Training
    • YouTube Channel
    • Online Courses
    • BLOGS
  • About Us
    • Careers
    • Partners
    • Corporate-Offices >
      • Training Center
    • Community Outreach
    • Top Certs of 2025
  • Contact

Certified Network Defender (CND)

Protect, Detect and Respond

Picture

EC Council CND

 Live Instructor and Worldwide via WebEx
CND boot camp is available on demand for groups of 5 or more.

Information Here

Email [email protected]
Course Description
The EC-Council Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cyber security education framework presented by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and responsibilities and the Department of Defense (DoD) job roles for system/network administrators.

The course is designed and developed after extensive market research and surveys. The program prepares network administrators on network security technologies and operations to attain Defense - in - Depth network security preparedness. It covers the protect, detect and respond approach to network security.
​
The course contains hands-on labs, based on major network security tools and techniques which will provide network administrators real world expertise on current network security technologies and operations. The study-kit provides you with over 10 GB of network security best practices, assessments and protection tools. The kit also contains templates for various network policies and a large number of white papers for additional learning. The exam will be given at the CyberProtex training center in Madison. 

Course Duration: 5 days


Group discounts are available. Course price is $2695 per person and includes study book and voucher.

Contact Us for more information.
This comprehensive course is designed to provide Network Administrators the skills and knowledge to protect, detect and mitigate network attacks. The participant of this course will be ready to take the EC|Council CND exam.
Outline of topics:
Module 01: Computer Network and Defense Fundamentals
  • Network Fundamentals
  • Network Components
  • TCP/IP Networking Basics
  • TCP/IP Protocol Stack
  • IP Addressing
  • Computer Network Defense (CND) Fundamentals
  • CND Triad, Process, Actions, and Approaches
Module 02: Network Security Threats, Vulnerabilities, and Attacks
  • Basics of Threats, Vulnerabilities, and Attacks
  • Network security Concerns
  • Network Reconnaissance Attacks
  • Network Access Attacks
  • DoS and DDoS
  • Malware Attacks
  • Viruses
Module 03: Network Security Controls, Protocols, and Devices
  • Network Security Controls
  • User Identification, Authentication, Authorization and Accounting
  • Security Policy
  • Network Security Devices
  • Network Security Protocols
Module 04: Network Security Policy Design and Implementation
  • What is a Security Policy
  • Internet Access Policies
  • Types of Information Security Policy
  • Types of Information Security Standards
Module 05: Physical Security
  • Physical Security
  • Access Control Authentication Techniques
  • Physical Security Controls
  • Workplace and Personnel Security
  • Awareness training and assessments
Module 06: Host Security
  • Host and OS Security
  • Linux Security
  • Securing Network Servers
  • Hardening Routers and Switches
  • Application/Software Security
  • Data and Virtualization Security
Module 07: Secure Firewall Configuration and Management
  • Firewalls and Concerns
  • Firewall Technologies and Topologies
  • Firewall Rule Set
  • Implementaion and Administration
  • Logging and Auditing
Module 08: Secure IDS Configuration and Management
  • Intrusions and IDPS
  • IDS types and Implementation
  • IDS Deployment Strategies and Alerts
  • IPS
  • IDPS Product Selection
  • IDS Counterparts
Module 09: Secure VPN Configuration and Management
  • Understanding Virtual Private Network (VPN)
  • VPN Components and Concentrators
  • VPN Types and Categories
  • VPN Topologies and Flaws
  • VPN Security
Module 10: Wireless Network Defense
  • Terminologies and Wireless Networks
  • Standards and Topologies
  • Components of Wireless Network
  • Encryption WEP vs. WPA vs. WPA2
  • Authentication
  • Network Threats
  • Bluetooth Threats
  • Wireless Network Security
Module 11: Network Traffic Monitoring and Analysis
Module 12: Network Risk and Vulnerability Management
Module 13: Data Backup and Recovery
Module 14: Network Incident Response and Management

To download and read the complete EC Council Cyber Program Guide (pdf) click on photo to right or click here.

Picture
PLEASE NOTE:  In some cases, vouchers for exams may only be obtained by the individual taking the exam. In those cases, we reserve the right to refund the cost of the voucher to the person taking the course from us with the intent they will take the refund and pay for the voucher themselves.

All courses are subject to cancellation and/or rescheduling due to insufficient enrollment or unforeseen circumstances, as per CyberProtex Policy.  Additionally, if for some unforeseen reason an instructor cannot be available at any particular time, we will notify the attendees of the class as soon as possible and allow a makeup time for the missed instruction due to the instructors' absence.
CyberProtex, LLC - 2012-2025

[email protected]

256-401-7072
Picture
Picture
  • SERVICES
    • mssp
    • Managed Services >
      • Security Operations Center >
        • Endpoint Protection
      • Operational Technology
      • Tabletop Exercises
      • Continuous Monitoring
    • Security and Compliance >
      • NIST 800-171 Assessments
      • CMMC Assessments
      • Incident Response
      • Penetration Testing
      • Vulnerability Assessments
      • Phishing Simulations
  • SOFTWARE
    • Azure Migrations >
      • Azure Security and Federation
      • Identity and Access Management
    • Dynamics 365
    • SQL Management
    • DevSecOps
    • Application Security
    • Software Products >
      • Vulnerability Genius Software
      • eMASS Simulator Software
      • ICS - SCADA Simulations
      • CyberLMS Software
  • Training
    • Certification >
      • Most Popular Certifications >
        • COMPTIA SECURITY+
        • CEH
        • CISM
        • ISC2-CISSP
        • CLOUD COMPUTING
        • AGILE AND SCRUM
        • ARTIFICAL INTELLIGENCE
        • DEVOPS
      • Cybersecurity Certifications >
        • ISC2-CC
        • ISC2-SSCP
        • ISC2-CGRC
        • ISC2-CSSLP
        • ISC2-ISSAP
        • ISC2-ISSEP
        • ISC2-ISSMP
        • ISACA-CISA
        • COMPTIA CASP+
        • COMPTIA CLOUD ESSENTIALS+
        • COMPTIA CLOUDNETX
        • COMPTIA DATA+
        • COMPTIA DATASYS+
        • COMPTIA DATAX
        • COMPTIA NETWORK+
        • COMPTIA PENTEST+
        • ISC2-CISSP
        • COMPTIA SECURITY+
        • COMPTIA SECURITYX
        • CEH
        • COMPTIA LINUX+
        • CISM
        • COMPTIA CYSA+
        • ISC2-CCSP
        • COMPTIA CLOUD+
        • COMPTIA A+
      • Microsoft Certifications >
        • SC-100
        • SC-200
        • AZ-500
        • SC-900
        • AZ-900
        • MS-900
        • PL-900
      • TOPICS >
        • CYBERSECURITY
        • CLOUD COMPUTING
        • ARTIFICAL INTELLIGENCE
        • VIRTUALIZATION
        • DEVOPS
        • AGILE AND SCRUM
      • BRANDS >
        • ISC2
        • COMPTIA
        • MICROSOFT
        • EC|COUNCIL
        • ISACA
        • AWS
        • CISCO
        • RED HAT
        • VMWARE
    • CMMC Workshop
    • Tabletop Exercises
    • ICS - SCADA Training
    • YouTube Channel
    • Online Courses
    • BLOGS
  • About Us
    • Careers
    • Partners
    • Corporate-Offices >
      • Training Center
    • Community Outreach
    • Top Certs of 2025
  • Contact