The Knowledge Academy Logo
01344 203999
  24 Hours Monday - Sunday
Empty
X

Send us your message.
We'll get back to you as soon as we can.

Please enter Name Please enter valid Email Please enter valid Phone number

Classroom Training

At The Knowledge Academy, our classroom-based training courses allow delegates to study and learn in a friendly, engaging, and interactive environment. We ensure the very best level of teaching, with first-rate instructors, resources, and state-of-the-art facilities. We provide courses of varying durations and can arrange weekend and residential courses in order to suit your requirements.

Furthermore, our classroom courses are carried out in thousands of locations worldwide, making training easily accessible wherever you are. Our courses typically begin at 9.00 am and continue until 5.00 pm each day, with breaks and refreshments provided. , As our most popular form of training available, we pride ourselves in continuously delivering an outstanding learning experience for our delegates in the classroom.

View classroom dates
  • Direct support from our experienced trainers throughout the course
  • Training courses available in thousands of locations globally
  • Partake in engaging and valuable activities in the classroom to boost your learning potential
  • Receive an all-encompassing learning experience

Online Training

Our online-based training courses aim to provide you with a complete training experience. Due to their flexibility, these courses are greatly suited to busy working professionals, or any individual who would prefer the convenience of an online training course.

Our Computer-Based Training (CBT) courses remove the time and cost associated with travelling to course locations. You can complete your chosen course in any location, and work at your own pace, as the learning portal can be accessed 24/7. All of our online training courses have technical and administrative support and mobile access. Furthermore, each course has been carefully designed to incorporate informative, instructive, and engaging content. In this way, online learning can guarantee a valuable and enjoyable training solution.

View online prices
  • Our flexible online courses provide you with 24/7 access
  • Take your time with 90 days from first login to complete the course
  • Enjoy an engaging and interactive learning experience
  • Courses available through our easy-to-use learning portal

In-House Training

Our In-House training option allows you to select any of our courses and receive training at a venue of your choice, by any method of your choice.

In-House courses deliver training to multiple employees at once, thus reducing travel expenses and providing you with the ultimate convenience and value for money. In addition, this option allows you to receive a training course that has been specifically tailored to meet your business needs, ensuring first-class quality, applicability, and value.

By choosing to bring bespoke training to the office, you can improve business performance, and make your organisation more streamlined, resourceful, and profitable. With over 25 years’ of experience, we are the market-leaders of In-House training.

Book onsite
  • Reduce the costs of employees taking time away from the workplace to train
  • Streamline your business with this bespoke training solution
  • Maximise your training budget
  • Monitor your employees’ progress and ensure that they receive applicable qualifications

Virtual Training

Our Virtual training courses provide you with the option to learn using a specialised simulated virtual environment. In this environment, our expert training instructors will be able to convey information and provide you with the all the knowledge you require to earn your qualification with The Knowledge Academy. As the largest global training provider, this method of training allows us to extend our training scope to those who may not be able to attend a classroom course itself, but would like to receive direct training and support from an instructor.
Using this training delivery method, you would benefit from the convenience of remote access and the elimination of the time and cost associated with travelling to a training venue.

View virtual dates
  • Receive direct support from our experienced trainers
  • Acquire the benefits of a classroom course, without the need to travel
  • Train from the comfort of your own home using remote access
  • All virtual training courses come with technical and administrative support
X
IT Security

Certified Network Defender (CND)

  • Exam Pass Guarantee: Enrol in any of our Certified Network Defender (CND) c
  • GUARANTEED LOWEST PRICE IN THE INDUSTRY with CND Exam Preparation in assessing&n
  • Our 4 day Certified Network Defender (CND) Exam Preparation Course foc
Popular Course

Page Menu

Course Information

Certified Network Defender (CND) Outline

 

The course covers the following 14 modules:

 

Module 01: Computer Network Defence Fundamentals

  • Network Fundamentals

  • Network Components

  • TCP/IP Networking Basics

  • TCP/IP Protocol Stack

  • IP Addressing

  • Computer Network Defence (CND)

  • CND Triad

  • CND Process

  • CND Actions

  • CND Approaches

 

Module 02: Network Security Threats, Vulnerabilities, and Attacks

  • Essential Terminologies

  • Network Security Concerns

  • Network Security Vulnerabilities

  • Network Reconnaissance Attacks

  • Network Access Attacks

  • Denial of Service (DoS) Attacks

  • Distributed Denial-of-Service Attack (DDoS)

  • Malware Attacks

 

Module 03: Network Security Controls, Protocols, and Devices

  • Fundamental Elements of Network Security

  • Network Security Controls

  • User Identification, Authentication, Authorisation and Accounting

  • Types of Authorisation Systems

  • Authorisation Principles

  • Cryptography

  • Security Policy

  • Network Security Devices

  • Network Security Protocols

 

Module 04: Network Security Policy Design and Implementation

  • What is Security Policy?

  • Internet Access Policies

  • Acceptable-Use Policy

  • User-Account Policy

  • Remote-Access Policy

  • Information-Protection Policy

  • Firewall-Management Policy

  • Special-Access Policy

  • Network-Connection Policy

  • Business-Partner Policy

  • Email Security Policy

  • Passwords Policy

  • Physical Security Policy

  • Information System Security Policy

  • Bring Your Own Devices (BYOD) Policy

  • Software/Application Security Policy

  • Data Backup Policy

  • Confidential Data Policy

  • Data Classification Policy

  • Internet Usage Policies

  • Server Policy

  • Wireless Network Policy

  • Incidence Response Plan (IRP)

  • User Access Control Policy

  • Switch Security Policy

  • Intrusion Detection and Prevention (IDS/IPS) Policy

  • Personal Device Usage Policy

  • Encryption Policy

  • Router Policy

  • Security Policy Training and Awareness

  • ISO Information Security Standards

  • Payment Card Industry Data Security Standard (PCI-DSS)

  • Health Insurance Portability and Accountability Act (HIPAA)

  • Information Security Acts: Sarbanes Oxley Act (SOX)

  • Information Security Acts: Gramm-Leach-Bliley Act (GLBA)

  • Information Security Acts: The Digital Millennium Copyright Act (DMCA) and Federal Information Security Management Act (FISMA)

  • Other Information Security Acts and Laws

 

Module 05: Physical Security

  • Physical Security

  • Access Control Authentication Techniques

  • Physical Security Controls

  • Other Physical Security Measures

  • Workplace Security

  • Personnel Security: Managing Staff Hiring and Leaving Process

  • Laptop Security Tool: EXO5

  • Environmental Controls

  • Physical Security: Awareness /Training

  • Physical Security Checklists

 

Module 06: Host Security

  • Host Security

  • OS Security

  • Linux Security

  • Securing Network Servers

  • Hardening Routers and Switches

  • Application/software Security

  • Data Security

  • Virtualisation Security

 

Module 07: Secure Firewall Configuration and Management

  • Firewalls and Concerns

  • What Firewalls Does?

  • What should you not Ignore?: Firewall Limitations

  • How Does a Firewall Work?

  • Firewall Rules

  • Types of Firewalls

  • Firewall Technologies

  • Firewall Topologies

  • Firewall Rule Set & Policies

  • Firewall Implementation

  • Firewall Administration

  • Firewall Logging and Auditing

  • Firewall Anti-evasion Techniques

  • Why Firewalls are Bypassed?

  • Full Data Traffic Normalisation

  • Data Stream-based Inspection

  • Vulnerability-based Detection and Blocking

  • Firewall Security Recommendations and Best Practices

  • Firewall Security Auditing Tools

 

Module 08: Secure IDS Configuration and Management

  • Intrusions and IDPS

  • IDS

  • Types of IDS Implementation

  • IDS Deployment Strategies

  • Types of IDS Alerts

  • IPS

  • IDPS Product Selection Considerations

  • IDS Counterparts

 

Module 09: Secure VPN Configuration and Management

  • Understanding Virtual Private Network (VPN)

  • How VPN works?

  • Why to Establish VPN ?

  • VPN Components

  • VPN Concentrators

  • Types of VPN

  • VPN Categories

  • Selecting Appropriate VPN

  • VPN Core Functions

  • VPN Technologies

  • VPN Topologies

  • Common VPN Flaws

  • VPN Security

  • Quality Of Service and Performance in VPNs

 

Module 10: Wireless Network Defense

  • Wireless Terminologies

  • Wireless Networks

  • Wireless Standard

  • Wireless Topologies

  • Typical Use of Wireless Networks

  • Components of Wireless Network

  • WEP (Wired Equivalent Privacy) Encryption

  • WPA (Wi-Fi Protected Access) Encryption

  • WPA2 Encryption

  • WEP vs. WPA vs. WPA2

  • Wi-Fi Authentication Method

  • Wi-Fi Authentication Process Using a Centralised Authentication Server

  • Wireless Network Threats

  • Bluetooth Threats

  • Wireless Network Security

  • Wi-Fi Discovery Tools

  • Locating Rogue Access points

  • Protecting from Denial-of-Service Attacks: Interference

  • Assessing Wireless Network Security

  • Wi-Fi Security Auditing Tool: AirMagnet WiFi Analyser

  • WPA Security Assessment Tool

  • Wi-Fi Vulnerability Scanning Tools

  • Deploying Wireless IDS (WIDS) and Wireless IPS (WIPS)

  • WIPS Tool

  • Configuring Security on Wireless Routers

  • Additional Wireless Network Security Guidelines

 

Module 11: Network Traffic Monitoring and Analysis

  • Network Traffic Monitoring and Analysis(Introduction)

  • Network Monitoring: Positioning your Machine at Appropriate Location

  • Network Traffic Signatures

  • Packet Sniffer: Wireshark

  • Detecting OS Fingerprinting Attempts

  • Detecting PING Sweep Attempt

  • Detecting ARP Sweep/ ARP Scan Attempt

  • Detecting TCP Scan Attempt

  • Detecting SYN/FIN DDOS Attempt

  • Detecting UDP Scan Attempt

  • Detecting Password Cracking Attempts

  • Detecting FTP Password Cracking Attempts

  • Detecting Sniffing (MITM) Attempts

  • Detecting the Mac Flooding Attempt

  • Detecting the ARP Poisoning Attempt

  • Additional Packet Sniffing Tools

  • Network Monitoring and Analysis

  • Bandwidth Monitoring

 

Module 12: Network Risk and Vulnerability Management

  • What is Risk?

  • Risk Levels

  • Risk Matrix

  • Key Risk Indicators(KRI)

  • Risk Management Phase

  • Enterprise Network Risk Management

  • Vulnerability Management

 

Module 13: Data Backup and Recovery

  • Introduction to Data Backup

  • RAID (Redundant Array Of Independent Disks) Technology

  • Storage Area Network (SAN)

  • Network Attached Storage (NAS)

  • Selecting Appropriate Backup Method

  • Choosing the Right Location for Backup

  • Backup Types

  • Conducting Recovery Drill Test

  • Data Recovery

  • Windows Data Recovery Tool

  • RAID Data Recovery Services

  • SAN Data Recovery Software

  • NAS Data Recovery Services

 

Module 14: Network Incident Response and Management

  • Incident Handling and Response

  • Incident Response Team Members: Roles and Responsibilities

  • First Responder

  • Incident Handling and Response Process

  • Overview of IH&R Process Flow

Back to top

Certified Network Defender (CND) Overview

This 4-day official EC Council course provides a detailed understanding of and practical skills for network defence, including how to protect, detect and respond to network attacks. You will learn network defence fundamentals including the application of network security controls, protocols, perimeter appliances, secure IDS, VPN and firewall configuration.


You will also learn the intricacies of network traffic signature, analysis and vulnerability scanning in order to design successful network security policies and incident response plans. At the end of the course, you will take the Certified Network Defender exam, allowing you to achieve Certified Network Defender (CND) certification.


Certified Network Defender certification is vendor-neutral, hands-on and skills-based. Aligned to a job-based cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE), it maps to highly-desired global system and network security roles. This makes it highly sought after by employers seeking assurance that potential employees have the practical skills needed to carry out their role effectively.

 

Back to top

Who should attend?

The course is aimed at anybody involved in network operations. This includes:

Network Administrators

Network Security Administrators

Network Security Engineer

Network Defence Technicians

CND Analysts

Security Analyst

Security Operator

 

Prerequisites

There are no prerequisites for this course, but a basic understanding of network security will be an advantage.

Certified Network Defender (CND) Examination

The EC Council Certified Network Defender exam consists of 100 multiple choice questions and lasts 4 hours. It must be booked separately at a Pearson Vue testing centre, for which we give you an exam voucher. Completion awards you CND certification.

Available delivery methods for this course:

Classroom

In-house

Online

Virtual

Upcoming classes

Speak to a member of our team

Call now

01344 203999 >

Or

Enquire Now

Dates & Prices for Certified Network Defender (CND)

Select your preferred delivery method

Filter your results

Why choose Virtual?

Attend your course from the office or home
Interactive support from experienced trainers
Simple to setup and easy to use on any device

Complete the steps below to receive a quote or more information

How will you be funding your training?

Self funding

Company funding

Not sure

Speak to a member of our team

Call now

01344 203999 >

Or

Enquire Now

Best Price in the Industry

We have the guaranteed best price for our courses in the industry

Trusted & Approved

The Knowledge Academy's Certified Ethical Hacker training courses are accredited by EC-Council

Resources Included

Resources are included for a comprehensive learning experience

Various Delivery Methods

Flexible delivery methods are available depending on your learning style


Certified Network Defender (CND) FAQs

Yes, this course is accredited by EC-Council and we are an Accredited Training Centre (ATC).
There are no prerequisites, but a basic understanding of network security will be an advantage.
An exam voucher for the exam is included. This must be booked separately through Pearson Vue.
Your instructor will be a security expert with many years of experience in network defence.
The course will begin at 9am and finish at 5pm each day.

Some of our clients

"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"

Joshua Davies, Thames Water

"...the trainer for this course was excellent. I would definitely recommend (and already have) this course to others."

Diane Gray, Shell


Back to top

Trustpilot