Catalog > All Topics

Certified Network Defender (CND) Certification Training (CND Training )

  • Course Summary
  • Schedule
5 Days
Download Course Outline
$3,595.00
Request a Quote
Credit not applicable
Share
Schedule
Export to CSV
  • No schedule events found for this course.
      • PC
        Private Class
        Privately train a group of your employees at your facility, virtually, or any of our locations.
    Request
  • LCLive Classroom
    Live Classroom
    Learn and interact with your instructor and peers in-person in our classrooms.
  • VCVirtual Classroom
    Virtual Classroom
    Attend any of our instructor-led classes virtually regardless of your physical location.
  • PCPrivate Class
    Private Class
    Privately train a group of your employees at your facility, virtually, or any of our locations.
  • GTRGuaranteed to Run
    Guaranteed to Run
    GTR classes are guaranteed to run as promised and delivered.
Course Summary
Show All

Description

In this Certified Network Defender (CND) training course, you will get prepped to pass the EC-Council CND 312-38 exam and learn the tactical skills needed to design and manage a secure network. Gain a solid understanding of defensive security and hands-on capability to handle all types of network defense. You will learn to ensure data security, properly configure networking technologies, and install defensive software to enhance confidentiality, integrity, and availability.

The network is the front line in the cyber security war, and network administrators need to be ready to defend it. Get certified with EC-Council's Certified Network Defender (CND) certification and demonstrate you have a solid foundation of network security and the tactical expertise to secure data and build defenses in an enterprise network.

Passing the CND Certification Exam meets U.S. DoD Directive 8140/8570.01 Technical (IAT) Level-I, Technical (IAT) Level-II, Management (IAM) Level-I, and CSSP Infrastructure Support.

In this CND Certification training, you will learn how to:

  • Install, configure, and manage network security controls and devices.
  • Design, implement, and monitor security policies.
  • Harden hosts to secure them against intrusions.
  • Implement and configure VNPs and wireless network technologies.
  • Perform risk, threat, and vulnerability assessments.

Prerequisites

You should have the basic network and host operations knowledge and experience commensurate with one to five years of network, host, or application administration.

Outline

CND Instructor-Led Course Outline

Module 1: Network Defender Fundamentals

Classifying threats, vulnerabilities, and attacks

  • Reducing risk
  • Identifying and assessing measures

Designing and implementing security policies

  • Understanding the hierarchy of security policies
  • Enforcing and promoting policies effectively

Module 2: Deploying Security Devices

Module 3: Implementing Host Security

Module 4: Securing the Network Perimeter

Module 5: Responding to Incidents

CND On-Demand Course Outline

Network Defender Fundamentals

Classifying threats, vulnerabilities, and attacks

  • Reducing risk
  • Identifying and assessing measures

Designing and implementing security policies

  • Understanding the hierarchy of security policies
  • Enforcing and promoting policies effectively

    Deploying Security Devices

    Configuring wireless security

  • Choosing secure and scalable protocols
  • Testing wireless security
  • Monitoring and managing defenses

  • Installing patches for hardening
  • Analyzing logs

Implementing Host Security

Preventing malware infestations

  • Hardening Systems
  • Defending with antivirus and safelists
  • Managing configuration

Evaluating baselines and monitoring

  • Patching and remediating hosts
  • Investigating types of authentication and authorization
  • Enforcing centralized access controls

Securing the Network Perimeter

Restricting access with a firewall

  • Designing the DMZ
  • Implementing deep inspection and filters

Encrypting data with a VPN

  • Selecting secure protocols
  • Authenticating encryption endpoints

Responding to Incidents

  • Monitoring traffic
  • Deploying IDS and IPS
  • Examining forensic artifacts

POPULAR LINKS
  • Course Catalog
  • Guaranteed to Run
  • Special Offers
  • Services
  • Student Services
  • Solutions
ABOUT
  • Company
  • News
  • Events
  • Contact Us
Skyline ATS
Corporate Headquarters
2148 Bering Drive
San Jose, CA 95131
  • 408-340-9800
  • 408-340-9800
Connect With Us
©2026 Skyline Advanced Technology Service
  • Policies
  • Privacy