Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and responsibilities and the Department of Defense (DoD) job roles for system/network administrators. The course is designed and developed after extensive market research and surveys.

  • About this course

    This self-study Certified Network Defender (CND) certification program focuses on creating Network Administrators who are trained on protecting, detecting and responding to the threats on the network. Network administrators are usually familiar with network components, traffic, performance and utilization, network topology, location of each system, security policy and so forth.

  • Why should you take this course?

    Future proof your career and meet the growing demand for cyber security professionals by becoming certified to protect, detect and respond to data threats with the Certified Network Defender course.

    As a CND, you will obtain a fundamental understanding of the true construct of data transfer, network technologies, software technologies providing you with the knowledge on how networks operate, understand what software is automating and how to analyze the subject material.

    In addition, network defence fundamentals, the application of network security controls, protocols, perimeter appliances, secure IDS, VPN and firewall configuration, intricacies of network traffic signature, analysis and vulnerability scanning are also covered which will help the Network Administrator design greater network security policies and successful incident response plans.

  • What will you learn by taking this course?

    ✅ A dedicated focus on IoT security

    ✅ Network virtualization practices for the remote workforce

    ✅ Enhanced Cloud Security & IoT and Operational Technology (OT) Modules

    ✅ Introduction to threat intelligence

    ✅ In-depth Attack Surface Analysis


  • Chaptar 1.Computer Network and Defense Fundamentals

    ✅ Network Fundamentals

    ✅ TCP/IP Networking Basics

    ✅ IP Addressing

    ✅ CND Triad

    ✅ CND Actions

    ✅ Network Components

    ✅ TCP/IP Protocol Stack

    ✅ Computer Network Defense (CND)

    ✅ CND Process

    ✅ CND Approaches

  • Chaptar 2. Network Security Threats, Vulnerabilities, and Attacks

    ✅Essential Terminologies

    ✅Network Security Concerns

    ✅Network Security Vulnerabilities

    ✅Network Reconnaissance Attacks

    ✅Network Access Attacks

    ✅Denial of Service (DoS) Attacks

    ✅Distributed Denial-of-Service Attack (DDoS)

    ✅Malware Attacks

     

     

  • Chaptar 3.Network Security Controls, Protocols, and Devices

    ✅Fundamental Elements of Network Security

    ✅Network Security Controls

    ✅User Identification, Authentication, Authorization and Accounting

    ✅Types of Authorization Systems

    ✅Authorization Principles

    ✅Cryptography

    ✅Security Policy

    ✅Network Security Devices

    ✅Network Security Protocol

     

  • Chaptar 4.Network Security Policy Design and Implementation

    ✅What is Security Policy?

    ✅Internet Access Policies

    ✅Acceptable-Use Policy

    ✅User-Account Policy

    ✅Remote-Access Policy

    ✅Information-Protection Policy

    ✅Firewall-Management Policy

    ✅Special-Access Policy

    ✅Business-Partner Policy

    ✅Email Security Policy

    ✅Passwords Policy

    ✅Network-Connection Policy

    ✅Physical Security Policy

    ✅Information System Security Policy

    ✅Bring Your Own Devices (BYOD) Policy

    ✅Software/Application Security Policy

    ✅Data Backup Policy

    ✅Server Policy

    ✅Wireless Network Policy

    ✅Incidence Response Plan (IRP)

    ✅User Access Control Policy

    ✅Switch Security Policy

     

     

  • Chaptar 5.Physical Security

    ✅Physical Security

    ✅Access Control Authentication Techniques

    ✅Physical Security Controls

    ✅Other Physical Security Measures

    ✅Workplace Security

    ✅Personnel Security: Managing Staff Hiring and Leaving Process

    ✅Laptop Security Tool: EXO5

    ✅Environmental Controls

    ✅Physical Security: Awareness /Training

    ✅Physical Security Checklists

     

     

  • Chaptar 6.Host Security

    ✅Host Security

    ✅OS Security

    ✅Windows Security

    ✅Linux Security

    ✅Securing Network Servers

    ✅Hardening Routers and Switches

    ✅Application/software Security

    ✅Data Secur

    ✅Virtualization Security

    ✅Virtualization Vendors

    ✅Virtualization Security

    ✅Securing Hypervisor

    ✅Securing Virtual machines

    ✅Secure Virtual Network Management

     

     

  • Chaptar 7.Secure Firewall Configuration and Management

    ✅Firewalls and Concerns

    ✅Firewall Rules

    ✅Firewall Technologies

    ✅Firewall Topologies

    ✅Firewall Rule Set & Policies

    ✅Firewall Implementation

    ✅Firewall Administration

    ✅Firewall Logging and Auditing

    ✅Firewall Security Auditing Tools

     

     

  • Chaptar 8.Secure IDS Configuration and Management

    ✅Intrusions and IDPS

    ✅IDS

    ✅Types of IDS Implementation

    ✅IDS Deployment Strategies

    ✅Types of IDS Alerts

    ✅IPS

    ✅IDPS Product Selection Considerations

    ✅IDS Counterparts

     

  • Chaptar 9.Secure VPN Configuration and Management

    ✅Understanding Virtual Private Network (VPN)

    ✅VPN Concentrators

    ✅Selecting Appropriate VPN

    ✅VPN Technologies

    ✅VPN Topologies

    ✅Common VPN Flaws

    ✅VPN Security

    ✅Quality Of Service and Performance in VPNs

     

     

  • Chaptar 10.Wireless Network Defense

    ✅Wireless Terminologies

    ✅Wireless Networks

    ✅Wireless Standard

    ✅Wireless Topologies

    ✅Typical Use of Wireless Networks

    ✅Components of Wireless Network

    ✅Bluetooth Threats

    ✅Wireless Network Security

     

  • Chaptar 11: Network Traffic Monitoring and Analysis

    ✅Router Based Monitoring Techniques

    ✅Non-Router Based Monitoring Techniques

    ✅Network Monitoring: Positioning your Machine at Appropriate Location

    ✅Network Traffic Signatures

    ✅Packet Sniffer: Wireshark

    ✅Detecting OS Fingerprinting Attempts

    ✅Detecting PING Sweep Attempt

    ✅Network Monitoring and Analysis

    ✅Bandwidth Monitoring

     

  • Chaptar 12. Network Risk and Vulnerability Management

    ✅Risk Levels

    ✅Risk Matrix

    ✅Key Risk Indicators(KRI)

    ✅Risk Management Phase

    ✅Enterprise Network Risk Management

    ✅Vulnerability Management

     

  • Chaptar 13. Data Backup and Recovery

    ✅Introduction to Data Backup

    ✅RAID (Redundant Array Of Independent Disks) Technology

    ✅Storage Area Network (SAN)

    ✅Network Attached Storage (NAS)

    ✅Selecting Appropriate Backup Method

    ✅Choosing the Right Location for Backup

    ✅Backup Types

     

     

  • Chaptar 14: Network Incident Response and Management

    ✅Incident Handling and Response

    ✅Incident Response Team Members: Roles and Responsibilities

    ✅First Responder

    ✅Incident Handling and Response Process

    ✅Forensic Investigation

    ✅Eradication and Recovery

    ✅Post-incident Activities

    ✅Training and Awareness

     

     


  • Who all can give CND Examination ?

    ✅Network Administrators

    ✅Network Security Administrators and Engineer

    ✅Security Analyst

    ✅Network Defense Technicians

    ✅CND Analyst

    ✅Security Operator

    ✅Anyone who involves in network operations

     

  • What are the eligibility criteria for self-study students?

    It is mandatory for you to record two years of information security-related work experience and
    get the same endorsed by your employer.

  • When will I get my certificate once I pass the certification examination?

    Upon successfully passing the exam you will receive your digital ANSI accredited CND certificate
    within 7 working days.

  • Can I review my answers?

    You can mark your questions and review your answers before you end the test.

  • Should I attend training to attempt the exam?

    EC-Council recommends, but not mandatory, that CND aspirants attend formal classroom training to reap the maximum benefit of the course and have a greater chance of clearing the examinations.

  • How many questions are there in the CND exam and what is the time duration?

    The CND examination consists of 100 questions. The exam is of 4-hour duration.

  • Key Features:
  • Created by a Security expert :
  • Access period : 12 months
  • Course duration : 40+ hours
  • Quizzes & revision exams :
  • Certificate of completion :
  • Support : 24/7 hours
Feature Picture

Why choose the Certified Network Defender?

Aspire-ethical-hacker Image

Future proof your career and meet the growing demand for cyber security professionals by becoming certified to protect, detect and respond to data threats with the Certified Network Defender course.

As a CND, you will obtain a fundamental understanding of the true construct of data transfer, network technologies, software technologies providing you with the knowledge on how networks operate, understand what software is automating and how to analyze the subject material.

In addition, network defence fundamentals, the application of network security controls, protocols, perimeter appliances, secure IDS, VPN and firewall configuration, intricacies of network traffic signature, analysis and vulnerability scanning are also covered which will help the Network Administrator design greater network security policies and successful incident response plans.

Included in your modules


Essential skills for your career:
       
  • Computer Network and Defense Fundamentals Response
  •    
  • Network Security Threats, Vulnerabilities, and Attacks
  •    
  • Network Security Controls, Protocols, and Devices
  •    
  • Network Security Policy Design and Implementation
  •    
  • Secure Firewall Configuration and Management
  •    
  • Physical Security Policy
  •    
  • Host Security
       
  • Secure IDS Configuration and Management
  •    
  • Secure VPN Configuration and Management
  •    
  • Network Incident Response and Management
  •    
  • Network Traffic Monitoring and Analysis
  •    
  • Network Risk and Vulnerability Management
  •    
  • Data Backup and Recovery
  •    
  • Wireless Network Defense
IT-Parofessional Image

Salary Indicator

SALARY PROJECTION

Average

salary after

completing

ADVANCED Training

$145k

You can earn an average of $145,000.00 a year

IT-Parofessional Image
1

Meet the demand

With data breaches striking Australian businesses daily, the demand for certified cyber security professionals is continuing to increase

2

Career ready education

Experience hands-on labs based on major network security tools, giving you real world expertize on all current network security technologies and operations

IT-Parofessional Image
IT-Parofessional Image
3

Great earnings

Due to the incredible demand for certified professionals, the average salary for cyber security is currently $80,000

Why learn with us?

       
  • We're tech career experts
  •    
  • 25,000+ students worldwide
  •    
  • Alternative to traditional university education
  •    
  • Start a new career or advance your current one & land your dream job
       
  • Award winning StudentCareTM
  •    
  • Most in-demand skills for job market
  •    
  • Partnered with biggest accreditors in the world
  •    
  • Exclusive student benefits; CV detox, NUS, industry events & loads more
IT-Parofessional Image

Boost Engagement with delivering Communication Tools

Bootcamp Image

Increase employee engagement with a different suite of communication tools like:

Posters

Promote your training program with visuals you can customize to brand... more  

Newsletters

Send training updates and security best practice highlights directly... more  

Digital wallpapers and web banners

Increase program engagement with colorful thought-provoking messaging... more  

Training Videos/Animations

Strengthen key awareness concepts and skills through stylish visual... more  

Why Aspire Tech


Award-winning courses

Aspire's award-winning online course and programs are designed and taught by distinguished Cyber Security expert.

The perfect fit for business

Plans for small to large organizations, with flexibility to fit inside your budget. Volume discounting available.

Cost effective training

Train thousands of staff members across multiple locations for a function of the cost of traditional classroom training.

Speak with an expert