Skip to content-main content

Certified Network Defender v2

This is the world’s most advanced Certified Network Defense course with 14 of the most current network security domains any individuals will ever want to know when they are planning to protect, detect, and respond to the network attacks.

No classes scheduled

Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program.  It is skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and responsibilities and the Department of Defense (DoD) job roles for system / network administrators.  The course is designed and developed after extensive market research and surveys.

The class material and training exercises prepares you on network security technologies and operations to attain Defense-in-Depth network security preparedness.  It also covers the protect, detect and respond approach to network security tools and techniques which will provide network administrators real world expertise on current network security technologies and operations.  Additionally, the study-kit provides you with numerous network security best practices, assessments and protection tools.

GigaWave includes a free Exam Voucher with each seat, a $400 value!

Who is this for?

The intended audience for our CND training program is an IT professional who is focused on network operations, specifically those who work with network security technologies and operations. CND is generally a great fit for those working in roles such as, but not limited to:

  • Network Administrators
  • Network security Administrators
  • Network Security Engineer
  • Network Defense Technicians
  • CND Analyst
  • Security Analyst
  • Security Operator
  • Anyone who is involved in network operations

Follow-On Courses

After completing this course, the student should be able to:

  • Understand about various network security controls, protocols, and devices
  • Troubleshoot their network for various network problems
  • Identify various threats on organization network
  • Design and implement various security policies for their organizations
  • Understand the importance of physical security and be able to determine and implement various physical security policies for their organizations
  • Harden security of various hosts individually in the organization’s network
  • Choose appropriate firewall solution, topology, and configurations to harden security through firewall
  • Determine appropriate location for IDS/IPS sensors, tuning IDS for false positives and false negatives, and configurations to harden security through IDPS technologies
  • Implement secure VPN implementation for their organization
  • Identify various threats to wireless network and learn how to mitigate them
  • Monitor and conduct signature analysis to detect various types of attacks and policy violation activities
  • Perform risk assessment, vulnerability assessment/scanning through various scanning tools and generate detailed reports on it
  • Identify the critical data, choose appropriate back up method, media and technique to perform successful backup of organization data on regular basis
  • Provide first response to the network security incident and assist IRT team and forensics investigation team in dealing with an incident
  • Module 1: Computer Network and Defense Fundamentals Response & Handling
  • Module 2: Network Security Threats, Vulnerabilities, and Attacks
  • Module 3: Network Security Controls, Protocols, and Devices
  • Module 4: Network Security Policy Design and Implementation
  • Module 5: Physical Security
  • Module 6: Host Security
  • Module 7: Secure Firewall Configuration and Management
  • Module 8: Secure IDS Configuration and Management
  • Module 9: Secure VPN Configuration and Management
  • Module 10: Wireless Network Defense
  • Module 11: Network Traffic Monitoring and Analysis
  • Module 12: Network Risk and Vulnerability Management
  • Module 13: Data Backup and Recovery
  • Module 14: Network Incident Response and Management