Send us your message.
We'll get back to you as soon as we can.
We have your course. Please kindly fill below your contact details to receive full course information and pricing.
At The Knowledge Academy, our classroom-based training courses allow delegates to study and learn in a friendly, engaging,
and interactive environment. We ensure the very best level of teaching, with first-rate instructors, resources,
and state-of-the-art facilities. We provide courses of varying durations and can arrange weekend and residential
courses in order to suit your requirements.
Furthermore, our classroom courses are carried out in thousands of locations worldwide, making training easily accessible wherever you are. Our courses typically begin at 9.00 am and continue until 5.00 pm each day, with breaks and refreshments provided. , As our most popular form of training available, we pride ourselves in continuously delivering an outstanding learning experience for our delegates in the classroom.
Our online-based training courses aim to provide you with a complete training experience. Due to their
flexibility, these courses are greatly suited to busy working professionals, or any individual who would prefer the
convenience of an online training course.
Our Computer-Based Training (CBT) courses remove the time and cost associated with travelling to course locations. You can complete your chosen course in any location, and work at your own pace, as the learning portal can be accessed 24/7. All of our online training courses have technical and administrative support and mobile access. Furthermore, each course has been carefully designed to incorporate informative, instructive, and engaging content. In this way, online learning can guarantee a valuable and enjoyable training solution.
Our In-House training option allows you to select any of our courses and receive training at a venue of your choice,
by any method of your choice.
In-House courses deliver training to multiple employees at once, thus reducing travel expenses and providing you with the ultimate convenience and value for money. In addition, this option allows you to receive a training course that has been specifically tailored to meet your business needs, ensuring first-class quality, applicability, and value.
By choosing to bring bespoke training to the office, you can improve business performance, and make your organisation more streamlined, resourceful, and profitable. With over 25 years’ of experience, we are the market-leaders of In-House training.
Our Virtual training courses provide you with the option to learn using a specialised simulated virtual environment.
In this environment, our expert training instructors will be able to convey information and provide you with the
all the knowledge you require to earn your qualification with The Knowledge Academy. As the largest global
training provider, this method of training allows us to extend our training scope to those who may not
be able to attend a classroom course itself, but would like to receive direct training and support from an instructor.
Using this training delivery method, you would benefit from the convenience of remote access and the elimination of the time and cost associated with travelling to a training venue.
The course covers the following 14 modules:
Module 01: Computer Network Defence Fundamentals
TCP/IP Networking Basics
TCP/IP Protocol Stack
Computer Network Defence (CND)
Module 02: Network Security Threats, Vulnerabilities, and Attacks
Network Security Concerns
Network Security Vulnerabilities
Network Reconnaissance Attacks
Network Access Attacks
Denial of Service (DoS) Attacks
Distributed Denial-of-Service Attack (DDoS)
Module 03: Network Security Controls, Protocols, and Devices
Fundamental Elements of Network Security
Network Security Controls
User Identification, Authentication, Authorisation and Accounting
Types of Authorisation Systems
Network Security Devices
Network Security Protocols
Module 04: Network Security Policy Design and Implementation
What is Security Policy?
Internet Access Policies
Email Security Policy
Physical Security Policy
Information System Security Policy
Bring Your Own Devices (BYOD) Policy
Software/Application Security Policy
Data Backup Policy
Confidential Data Policy
Data Classification Policy
Internet Usage Policies
Wireless Network Policy
Incidence Response Plan (IRP)
User Access Control Policy
Switch Security Policy
Intrusion Detection and Prevention (IDS/IPS) Policy
Personal Device Usage Policy
Security Policy Training and Awareness
ISO Information Security Standards
Payment Card Industry Data Security Standard (PCI-DSS)
Health Insurance Portability and Accountability Act (HIPAA)
Information Security Acts: Sarbanes Oxley Act (SOX)
Information Security Acts: Gramm-Leach-Bliley Act (GLBA)
Information Security Acts: The Digital Millennium Copyright Act (DMCA) and Federal Information Security Management Act (FISMA)
Other Information Security Acts and Laws
Module 05: Physical Security
Access Control Authentication Techniques
Physical Security Controls
Other Physical Security Measures
Personnel Security: Managing Staff Hiring and Leaving Process
Laptop Security Tool: EXO5
Physical Security: Awareness /Training
Physical Security Checklists
Module 06: Host Security
Securing Network Servers
Hardening Routers and Switches
Module 07: Secure Firewall Configuration and Management
Firewalls and Concerns
What Firewalls Does?
What should you not Ignore?: Firewall Limitations
How Does a Firewall Work?
Types of Firewalls
Firewall Rule Set & Policies
Firewall Logging and Auditing
Firewall Anti-evasion Techniques
Why Firewalls are Bypassed?
Full Data Traffic Normalisation
Data Stream-based Inspection
Vulnerability-based Detection and Blocking
Firewall Security Recommendations and Best Practices
Firewall Security Auditing Tools
Module 08: Secure IDS Configuration and Management
Intrusions and IDPS
Types of IDS Implementation
IDS Deployment Strategies
Types of IDS Alerts
IDPS Product Selection Considerations
Module 09: Secure VPN Configuration and Management
Understanding Virtual Private Network (VPN)
How VPN works?
Why to Establish VPN ?
Types of VPN
Selecting Appropriate VPN
VPN Core Functions
Common VPN Flaws
Quality Of Service and Performance in VPNs
Module 10: Wireless Network Defense
Typical Use of Wireless Networks
Components of Wireless Network
WEP (Wired Equivalent Privacy) Encryption
WPA (Wi-Fi Protected Access) Encryption
WEP vs. WPA vs. WPA2
Wi-Fi Authentication Method
Wi-Fi Authentication Process Using a Centralised Authentication Server
Wireless Network Threats
Wireless Network Security
Wi-Fi Discovery Tools
Locating Rogue Access points
Protecting from Denial-of-Service Attacks: Interference
Assessing Wireless Network Security
Wi-Fi Security Auditing Tool: AirMagnet WiFi Analyser
WPA Security Assessment Tool
Wi-Fi Vulnerability Scanning Tools
Deploying Wireless IDS (WIDS) and Wireless IPS (WIPS)
Configuring Security on Wireless Routers
Additional Wireless Network Security Guidelines
Module 11: Network Traffic Monitoring and Analysis
Network Traffic Monitoring and Analysis(Introduction)
Network Monitoring: Positioning your Machine at Appropriate Location
Network Traffic Signatures
Packet Sniffer: Wireshark
Detecting OS Fingerprinting Attempts
Detecting PING Sweep Attempt
Detecting ARP Sweep/ ARP Scan Attempt
Detecting TCP Scan Attempt
Detecting SYN/FIN DDOS Attempt
Detecting UDP Scan Attempt
Detecting Password Cracking Attempts
Detecting FTP Password Cracking Attempts
Detecting Sniffing (MITM) Attempts
Detecting the Mac Flooding Attempt
Detecting the ARP Poisoning Attempt
Additional Packet Sniffing Tools
Network Monitoring and Analysis
Module 12: Network Risk and Vulnerability Management
What is Risk?
Key Risk Indicators(KRI)
Risk Management Phase
Enterprise Network Risk Management
Module 13: Data Backup and Recovery
Introduction to Data Backup
RAID (Redundant Array Of Independent Disks) Technology
Storage Area Network (SAN)
Network Attached Storage (NAS)
Selecting Appropriate Backup Method
Choosing the Right Location for Backup
Conducting Recovery Drill Test
Windows Data Recovery Tool
RAID Data Recovery Services
SAN Data Recovery Software
NAS Data Recovery Services
Module 14: Network Incident Response and Management
Incident Handling and Response
Incident Response Team Members: Roles and Responsibilities
Incident Handling and Response Process
Overview of IH&R Process Flow
This 4-day official EC Council course provides a detailed understanding of and practical skills for network defence, including how to protect, detect and respond to network attacks. You will learn network defence fundamentals including the application of network security controls, protocols, perimeter appliances, secure IDS, VPN and firewall configuration.
You will also learn the intricacies of network traffic signature, analysis and vulnerability scanning in order to design successful network security policies and incident response plans. At the end of the course, you will take the Certified Network Defender exam, allowing you to achieve Certified Network Defender (CND) certification.
Certified Network Defender certification is vendor-neutral, hands-on and skills-based. Aligned to a job-based cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE), it maps to highly-desired global system and network security roles. This makes it highly sought after by employers seeking assurance that potential employees have the practical skills needed to carry out their role effectively.
Back to top
The course is aimed at anybody involved in network operations. This includes:
• Network Administrators
• Network Security Administrators
• Network Security Engineer
• Network Defence Technicians
• CND Analysts
• Security Analyst
• Security Operator
There are no prerequisites for this course, but a basic understanding of network security will be an advantage.
The EC Council Certified Network Defender exam consists of 100 multiple choice questions and lasts 4 hours. It must be booked separately at a Pearson Vue testing centre, for which we give you an exam voucher. Completion awards you CND certification.
Select your preferred delivery method
Filter your results
We have the guaranteed best price for our courses in the industry
The Knowledge Academy's Certified Ethical Hacker training courses are accredited by EC-Council
Resources are included for a comprehensive learning experience
Flexible delivery methods are available depending on your learning style
"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"
Joshua Davies, Thames Water
"...the trainer for this course was excellent. I would definitely recommend (and already have) this course to others."
Diane Gray, Shell
Back to top