Monday - Sunday: 8am - 5pm
SysCare Sri LankaSysCare Sri LankaSysCare Sri Lanka
(+94) 076 0 454 562
info@syscare.lk
Sri Lanka

Certified Network Defender C|ND v.3

Certified Network Defender C|ND v.3

Course Overview

SysCare IT Solutions, a premier training provider, offers the Certified Network Defender (C|ND) course by EC-Council. This course is designed to equip IT Professional with the skills required to defend network security through proactive measures. The course covers network security from a practical perspective, focusing on securing and maintaining the network against threats and vulnerabilities.

Adaptive Security Strategy of C|ND

Why Choose SysCare Training?

SysCare IT Solutions covers all essential aspects of network defense, from network security fundamentals to advanced defensive strategies, and SysCare Professional IT Training constantly updates with the latest industry trends and developments.

 Learn from cybersecurity professionals with years of experience in network defense. Our instructors bring practical knowledge to the classroom, ensuring you receive top-notch training.

At SysCare IT Solutions, we believe in learning by doing. The CND course includes hands-on labs and simulations, allowing you to practice your skills.

Completing the CND course prepares you to earn the Certified Network Defender certification from EC-Council, a globally recognized credential that distinguishes you in the cybersecurity job market.

Course Objectives

Network Security Fundamentals
Network Defense
Threat Intelligence
Vulnerability
Incident Response

Exam Details

Who Should Attend? Prerequisites
  • Network administrators
  • Network Security Administrators
  • Network Security Engineers
  • Security Auditors
  • Security Analysts
  • Any IT professionals involved in network operations
  • Basic Knowledge of network protocols and devices
  • Familiarity with network security concepts

Course Modules

Covers various types of network attacks and the strategies to defend against them, including preventive measures and response tactics.

Focuses on the policies and procedures necessary for maintaining network security from an administrative perspective.

Discusses the technical aspects of network security, including configurations, tools, and technologies used to secure networks.

Examines the methods to secure the network perimeter, such as firewalls, intrusion detection systems, and demilitarized zones (DMZs).

Explores security measures specific to Windows operating systems, including antivirus software, patch management, and configuration settings.

Covers security techniques for Linux systems, including permissions management, firewall configurations, and security tools.

Discusses securing mobile devices against threats, covering aspects like encryption, secure app usage, and mobile device management (MDM).

Focuses on the unique security challenges and solutions for Internet of Things (IoT) devices.

Looks at administrative practices for securing applications, including policy development and user training.

Covers methods to protect data at rest, in transit, and during processing, including encryption and access controls.

 

Discusses securing virtual networks within enterprises, including virtual firewalls and network segmentation.

Focuses on securing cloud-based networks, covering cloud-specific threats and security practices.

Examines the security of wireless networks, including WPA3, secure access points, and wireless intrusion prevention systems.

Covers techniques and tools for monitoring and analyzing network traffic to detect and respond to anomalies.

Discusses the importance of log management and analysis for identifying and responding to security incidents.

Explores the steps for responding to security incidents and conducting forensic investigations to determine the cause and impact.

Covers planning and implementation of business continuity and disaster recovery strategies to maintain operations during disruptions.

 

Focuses on identifying, assessing, and managing risks to minimize their impact on network security.

Discusses evaluating the attack surface of a network to identify vulnerabilities and potential threats.

Covers the use of cyber threat intelligence to predict and prepare for potential security threats.

Enroll Now

By Choosing SysCare IT Solutions for your EC-Council training needs, you ensure that you are receiving the best professional IT training available, delivered by experts dedicated to your success. Enroll today to start your journey towards becoming a Certified Network Defender.

Brochures

Follow Us