• Online, Instructor-Led
  • Classroom
Course Description

EC-Council's Certified Network Defender (C|ND) is an essential vendor-neutral network security certification for every IT and systems administrator who needs to operate with a secure mindset. Students will learn the critical skills required to defend their networks and operating environments across local networks, endpoints, cloud infrastructure, applications, OT, and Mobile. They will also acquire knowledge of effective proper log analysis, network traffic monitoring, basic investigation and response, as well as business continuity and disaster recovery. Additionally, they will dive into threats, analyzing the attack surface, and studying threat prediction and threat intelligence as it relates to their administration and defense responsibilities. Often referred to as blue-teaming, C|NDs will be able to apply defense and countermeasure strategies in their organizations, playing a critical role not only in attack prevention but also in detection, response, and remediation as they configure networks and systems to operate securely.

The C|ND program will cover the concepts and fortify skills through hands-on practice across over 110 labs delivered on live target machines. The C|ND program designed by industry experts prepares network defenders with strategic, technological, and operational network security capabilities, enabling them to design, develop, and maintain secure networks.

Learning Objectives

Planning and administering network security for organizations
Recognizing security risks, threats, and vulnerabilities
Ensuring compliance with regulatory standards
Designing and implementing network security policies
Applying security principles in distributed and mobile computing environment
Implementing Identity and Access Management, encryption, and network segmentation
Managing Windows and Linux Security Administration
Addressing security risks in mobile devices and IoT
Implementing strong data security techniques
Managing security in virtualization technologies and cloud platforms
Implementing wireless network security
Conducting risk and vulnerability assessments
Providing first response to security incidents
Identifying Indicators of Compromise and Attack
Integrating threat intelligence for proactive defense
Conducting Attack Surface Analysis
Assisting in Business Continuity and Disaster Recovery planning
Monitoring network traffic and performing log management
Managing proxy, content filtering, and troubleshooting network issues
Hardening security of endpoints and selecting firewall solutions
Configuring IDS/IPS for enhanced security
Maintaining an inventory of network devices
Providing security awareness guidance and training
Managing AAA for network devices
Reviewing audit logs and analyzing security anomalies
Maintaining and configuring security platforms
Evaluating security products and operations procedures
Identifying and classifying organizational assets
Implementing system integrity monitoring tools
Understanding EDR/XDR and UEBA solutions
Conducting PIA processes for privacy assessment
Collaborating on threat hunting and incident response
Understanding SOAR platforms in cybersecurity operations
Integrating Zero Trust principles into security architectures
Staying updated on emerging cyber threats
Understanding the role of AI/ML in cyber defense.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):