Certified Network Defender (CND) is a hands-on, instructor-led comprehensive network security certification training program that is vendor-neutral.The National Initiative of Cybersecurity Education (NICE has developed a skills-based, lab-intensive program based on a job-task analysis and cybersecurity education framework .The course has also been matched to worldwide job roles and responsibilities, as well as job roles for system/network administrators in the Department of Defense (DoD).The course is designed and developed after extensive market research and surveys.

  • About this course

    The target of this self-study Certified Network Defender (CND) certification program is to teach Network Administrators in guarding, detecting, and responding to network attacks. Network administrators are typically able to deal with network components, traffic, performance, and usage, network topology, system location, and security policies, among other things.

  • Why should you take this course?

    With the Certified Network Defender course, you can future-proof your career and meet the growing demand for cyber security specialists by getting certified to protect, detect, and respond to data attacks.As a CND, you'll gain a fundamental understanding of the true construct of data transfer, network technologies, and software technologies, allowing you to understand how networks work, what software automates, and how to analyze subject material.

    In addition, the fundamentals of network defense, the application of network security controls, protocols, perimeter appliances, secure IDS, VPN, and firewall configuration, and the intricacies of network traffic signature, analysis, and vulnerability scanning are covered, all of which will assist the Network Administrator in designing more effective network security policies and incident response plans.

  • What will you learn by taking this course?

    ✅ A dedicated focus on IoT security

    ✅ Network virtualization practices for the remote workforce

    ✅ Enhanced Cloud Security & IoT and Operational Technology (OT) Modules

    ✅ Introduction to threat intelligence

    ✅ In-depth Attack Surface Analysis

  • Chapter 1: Computer Network and Defense Fundamentals

    ✅ Network Fundamentals

    ✅ TCP/IP Networking Basics

    ✅ IP Addressing

    ✅ CND Triad

    ✅ CND Actions

    ✅ Network Components

    ✅ TCP/IP Protocol Stack

    ✅ Computer Network Defense (CND)

    ✅ CND Process

    ✅ CND Approaches

  • Chapter 2: Network Security Threats, Vulnerabilities, and Attacks

    ✅ Essential Terminologies

    ✅ Network Security Concerns

    ✅ Network Security Vulnerabilities

    ✅ Network Reconnaissance Attacks

    ✅ Network Access Attacks

    ✅ Denial of Service (DoS) Attacks

    ✅ Distributed Denial-of-Service Attack (DDoS)

    ✅ Malware Attacks



  • Chapter 3: Network Security Controls, Protocols, and Devices

    ✅ Fundamental Elements of Network Security

    ✅ Network Security Controls

    ✅ User Identification, Authentication, Authorization and Accounting

    ✅ Types of Authorization Systems

    ✅ Authorization Principles

    ✅ Cryptography

    ✅ Security Policy

    ✅ Network Security Devices

    ✅ Network Security Protocol


  • Chapter 4: Network Security Policy Design and Implementation

    ✅ What is Security Policy?

    ✅ Internet Access Policies

    ✅ Acceptable-Use Policy

    ✅ User-Account Policy

    ✅ Remote-Access Policy

    ✅ Information-Protection Policy

    ✅ Firewall-Management Policy

    ✅ Special-Access Policy

    ✅ Business-Partner Policy

    ✅ Email Security Policy

    ✅ Passwords Policy

    ✅ Network-Connection Policy

    ✅ Physical Security Policy

    ✅ Information System Security Policy

    ✅ Bring Your Own Devices (BYOD) Policy

    ✅ Software/Application Security Policy

    ✅ Data Backup Policy

    ✅ Server Policy

    ✅ Wireless Network Policy

    ✅ Incidence Response Plan (IRP)

    ✅ User Access Control Policy

    ✅ Switch Security Policy



  • Chapter 5: Physical Security

    ✅ Physical Security

    ✅ Access Control Authentication Techniques

    ✅ Physical Security Controls

    ✅ Other Physical Security Measures

    ✅ Workplace Security

    ✅ Personnel Security: Managing Staff Hiring and Leaving Process

    ✅ Laptop Security Tool: EXO5

    ✅ Environmental Controls

    ✅ Physical Security: Awareness /Training

    ✅ Physical Security Checklists



  • Chapter 6: Host Security

    ✅ Host Security

    ✅ OS Security

    ✅ Windows Security

    ✅ Linux Security

    ✅ Securing Network Servers

    ✅ Hardening Routers and Switches

    ✅ Application/software Security

    ✅ Data Secur

    ✅ Virtualization Security

    ✅ Virtualization Vendors

    ✅ Virtualization Security

    ✅ Securing Hypervisor

    ✅ Securing Virtual machines

    ✅ Secure Virtual Network Management



  • Chapter 7: Secure Firewall Configuration and Management

    ✅ Firewalls and Concerns

    ✅ Firewall Rules

    ✅ Firewall Technologies

    ✅ Firewall Topologies

    ✅ Firewall Rule Set & Policies

    ✅ Firewall Implementation

    ✅ Firewall Administration

    ✅ Firewall Logging and Auditing

    ✅ Firewall Security Auditing Tools



  • Chapter 8: Secure IDS Configuration and Management

    ✅ Intrusions and IDPS

    ✅ IDS

    ✅ Types of IDS Implementation

    ✅ IDS Deployment Strategies

    ✅ Types of IDS Alerts

    ✅ IPS

    ✅ IDPS Product Selection Considerations

    ✅ IDS Counterparts


  • Chapter 9: Secure VPN Configuration and Management

    ✅ Understanding Virtual Private Network (VPN)

    ✅ VPN Concentrators

    ✅ Selecting Appropriate VPN

    ✅ VPN Technologies

    ✅ VPN Topologies

    ✅ Common VPN Flaws

    ✅ VPN Security

    ✅ Quality Of Service and Performance in VPNs



  • Chapter 10: Wireless Network Defense

    ✅ Wireless Terminologies

    ✅ Wireless Networks

    ✅ Wireless Standard

    ✅ Wireless Topologies

    ✅ Typical Use of Wireless Networks

    ✅ Components of Wireless Network

    ✅ Bluetooth Threats

    ✅ Wireless Network Security


  • Chapter 11: Network Traffic Monitoring and Analysis

    ✅ Router Based Monitoring Techniques

    ✅ Non-Router Based Monitoring Techniques

    ✅ Network Monitoring: Positioning your Machine at Appropriate Location

    ✅ Network Traffic Signatures

    ✅ Packet Sniffer: Wireshark

    ✅ Detecting OS Fingerprinting Attempts

    ✅ Detecting PING Sweep Attempt

    ✅ Network Monitoring and Analysis

    ✅ Bandwidth Monitoring


  • Chapter 12: Network Risk and Vulnerability Management

    ✅ Risk Levels

    ✅ Risk Matrix

    ✅ Key Risk Indicators(KRI)

    ✅ Risk Management Phase

    ✅ Enterprise Network Risk Management

    ✅ Vulnerability Management


  • Chapter 13: Data Backup and Recovery

    ✅ Introduction to Data Backup

    ✅ RAID (Redundant Array Of Independent Disks) Technology

    ✅ Storage Area Network (SAN)

    ✅ Network Attached Storage (NAS)

    ✅ Selecting Appropriate Backup Method

    ✅ Choosing the Right Location for Backup

    ✅ Backup Types



  • Chapter 14: Network Incident Response and Management

    ✅ Incident Handling and Response

    ✅ Incident Response Team Members: Roles and Responsibilities

    ✅ First Responder

    ✅ Incident Handling and Response Process

    ✅ Forensic Investigation

    ✅ Eradication and Recovery

    ✅ Post-incident Activities

    ✅ Training and Awareness



  • Who all can give CND Examination ?

    ✅Network Administrators

    ✅Network Security Administrators and Engineer

    ✅Security Analyst

    ✅Network Defense Technicians

    ✅CND Analyst

    ✅Security Operator

    ✅Anyone who involves in network operations


  • What are the eligibility criteria for self-study students?

    It is mandatory for you to record two years of information security-related work experience and
    get the same endorsed by your employer.

  • When will I get my certificate once I pass the certification examination?

    Upon successfully passing the exam you will receive your digital ANSI accredited CND certificate
    within 7 working days.

  • Can I review my answers?

    You can mark your questions and review your answers before you end the test.

  • Should I attend training to attempt the exam?

    EC-Council recommends, but not mandatory, that CND aspirants attend formal classroom training to reap the maximum benefit of the course and have a greater chance of clearing the examinations.

  • How many questions are there in the CND exam and what is the time duration?

    The CND examination consists of 100 questions. The exam is of 4-hour duration.

  • Key Features:
  • Created by a Security expert :
  • Access period : 12 months
  • Course duration : 40+ hours
  • Quizzes & revision exams :
  • Certificate of completion :
  • Support : 24/7 hours
Feature Picture
icon Training in Group
icon8 hours Training
icon Guaranteed Date
Course Name


Pick your preferred schedule
16 Oct 8 Hours/Day
9:00AM - 5PM BST Bangladesh
16 Oct 8 Hours/Day
9:00AM - 5PM BST Bangladesh
16 Oct 8 Hours/Day
9:00AM - 5PM BST Bangladesh
16 Oct 8 Hours/Day
9:00AM - 5PM BST Bangladesh
16 Oct 8 Hours/Day
9:00AM - 5PM BST Bangladesh
16 Oct 8 Hours/Day
9:00AM - 5PM BST Bangladesh
icon 1-on-1 Training
icon 4 hours Training
icon Guaranteed Date
8 hours Training
Course Name


Pick your preferred date & time
Start Time : 09:00 AM
12 AM 12 PM

Why learn with us?

  • We're tech career experts
  • 25,000+ students worldwide
  • Alternative to traditional university education
  • Start a new career or advance your current one & land your dream job
  • Award winning StudentCare
  • Most in-demand skills for job market
  • Partnered with most biggest accreditors in the world
  • Exclusive student benefits
IT-Parofessional Image


AZ-900 Image
  • Exam Pass Guarantee (live online)
  • 100% Satisfaction Guarantee
  • Immediate access to Aspire portal for practice exam
  • Get started with Certification pathway
  • Knowledge Transfer Guarantee
  • Take advantage of globally recognized platform

Career ready education

Experience hands-on labs based on major network security tools, giving you real world expertize on all current network security technologies and operations

IT-Parofessional Image

Find Your Boot Camp

Boost Engagement with delivering Communication Tools

Bootcamp Image

Increase employee engagement with a different suite of communication tools like:


Promote your training program with visuals you can customize to brand... more  


Send training updates and security best practice highlights directly... more  

Digital wallpapers and web banners

Increase program engagement with colorful thought-provoking messaging... more  

Training Videos/Animations

Strengthen key awareness concepts and skills through stylish visual... more  

Why Aspire Tech

Award-winning courses

Aspire's award-winning online courses and programs are created and delivered by a renowned Cyber Security specialist.

The perfect fit for business

Plans for small to large businesses that are flexible to match your budget. There is a volume discount available.

Cost effective training

For a fraction of the expense of traditional classroom training, train thousands of employees in numerous locations.

Speak with an expert