Skip to main content

Description

CND v2 is an in-depth training program for network administrators, aimed at perfecting their technical skills in network defense, as well as in detecting and responding to cyber attacks. The course also leads to the renowned Certified Network Defender certification, issued by our partner EC-Council.
Over a period of five intensive days, you will learn how to mitigate IT threats and secure corporate network infrastructures. From the very first modules, you'll be introduced to the fundamentals of network defense. Then you'll learn about network security controls, protocols, equipment protection, implementing intrusion detection systems and secure VPNs, as well as firewall configuration.
The final modules will focus on technical aspects such as network traffic signatures, vulnerability analysis, developing a network security policy and setting up an incident response plan. At the end of the course, you will have the opportunity to take the official exam to become a Certified Network Defender v2 (for more information, see the certification tab).

Day 1: Network Security Fundamentals

  • Network attacks and defense strategies: Understand the different threats and protection methods.
    Administrative network security: Explore secure network management practices.
  • Technical network security: Analyze the essential technical aspects of infrastructure protection.

Day 2: Perimeter and Endpoint Protection
Network perimeter security: Examine protection measures at network boundaries.

  • Endpoint security for Windows systems: Learn how to secure Windows devices.
  • Endpoint security for Linux systems: Focus on protecting Linux devices.

Day 3: Securing mobile and IoT devices

  • Endpoint security for mobile devices: Protecting mobile devices against threats.
  • Endpoint security for IoT devices: Managing the security of connected objects.

Day 4: Application and data security

  • Administrative application security: Guarantee the security of applications used in administration.
    Data security: Protect sensitive information from unauthorized access.
  • Enterprise virtual network security: Understand how to protect virtual networks.

Day 5: Monitoring, Incident Response and Risk Management

  • Network traffic monitoring and analysis: Implement traffic detection and analysis systems.
  • Network log monitoring and analysis: Examine logs to identify possible anomalies.
  • Incident response and forensic investigation: Learn how to respond to security incidents.
  • Business continuity and disaster recovery: Develop plans to ensure operational continuity.
  • Anticipation and risk management: Identify and proactively manage potential risks.
  • Threat assessment via attack surface analysis: Analyze potential vulnerabilities.
  • Threat prediction via cyberthreat intelligence: Use intelligence to anticipate future attacks.
  • This organization enables a progressive, in-depth approach to network security.

IT security professionals wishing to improve their Wi-Fi security skills, network administrators or anyone wishing to understand the risks associated with Wi-Fi networks and how to protect them.

Taking the CND v2 network security training course requires the following prerequisites:

  • advanced knowledge of Windows and Linux operating systems (file systems, permissions, security, firewalls, etc.);
  • mastery of network fundamentals, such as TCP/IP protocols;
  • knowledge of the roles and services used by servers at network level.

By taking the CND v2 network security training course, you will be able to achieve the following objectives:

  • Understand how computer networks work, and gain an in-depth understanding of the essential principles of protection systems.
  • Implement network security measures by applying rigorous protocols, establishing secure perimeters with intrusion prevention systems (IPS), configuring virtual private networks (VPNs) and setting up firewalls.
  • Understand the characteristics of network traffic signatures, as well as techniques for analyzing and detecting vulnerabilities.
  • Master the design of robust, secure network architectures.
  • Be able to protect, detect, respond to and anticipate attacks on corporate infrastructures.
  • Establish a genuine defense policy for networks and IT security.
  • Pass the 312-38 exam and obtain C|ND certification.

We design, build and support digital products for clients who want to make a positive impact in their industry. Creative with technology, we develop great solutions to help our clients grow and especially by strengthening our relationships based on continuous improvement, maintenance, support and hosting services.

Follow us