Course information
- Course syllabus
- Who it’s for
- What’s included
- FAQs
Certified Network Defender Certification Course Outline
Module 1: Network Attacks and Defence Strategies
- Attack
- Threat
- Threat Sources
- Threat Actors
- Vulnerability
- Risk
- Network Attacks
- Application Attacks
- Social Engineering Attacks
- Email Attacks
- Mobile Attacks
- Cloud Attacks
- Supply Chain Attacks
- Wireless Attacks
- Hacking Methodologies and Frameworks
- Adaptive Security Strategy
- Defence-in-depth Security
Module 2: Administrative Network Security
- Compliance
- Regulatory Frameworks
- Security Policies
- Security Awareness
- Asset Management
- Recent Cybersecurity Trends
Module 3: Technical Network Security
- Access Controls
- Authentication
- Authorisation
- Accounting (AAA)
- IAM
- Cryptography
- Network Segmentation
- Zero Trust
- Network Security Controls
- Network Security Protocols
Module 4: Network Perimeter Security
- Firewalls
- Firewall Types
- Firewall Topologies
- Firewall Selection
- Firewall Implementation and Deployment
- Firewall Administration
- IDS/IPS
- IDS/IPS Classification
- IDS/IPS Selection
- False Positives
- False Negatives
- Router Security
- Switch Security
- Software-defined Perimeter (SDP)
Module 5: Endpoint Security-Windows Systems
- Windows Security Risks
- Windows Security Components
- Windows Security Features
- Windows Security Baseline Configurations
- User Account and Password Management
- Windows Patch Management
- Windows User Access Management
- Active Directory Security
- Windows Network Services and Protocol Security
- Windows Security Best Practices
Module 6: Endpoint Security-Linux Systems
- Linux Security Risks
- Linux Installation and Patching
- Linux User Access and Password Management
- Linux OS Hardening Techniques
- Linux Network and Remote Access Security
- Linux Security Tools and Frameworks
Module 7: Endpoint Security- Mobile Devices
- Bring Your Own Device (BYOD)
- Choose Your Own Device (CYOD)
- Corporate Owned, Personally Enabled (COPE)
- Company Owned, Business Only (COBO)
- Mobile Device Management (MDM)
- Mobile Application Management (MAM)
- Mobile Threat Defence (MTD)
- Unified Endpoint Management (UEM)
- Mobile Email Management (MEM)
- Mobile Content Management (MCM)
- Enterprise Mobility Management (EMM)
- Mobile Device Security
- Android Security
- iPhone Security
Module 8: Endpoint Security-IoT Devices
- IoT Devices
- IoT Application Areas
- IoT Ecosystem
- IoT Communication Models
- IoT-Enabled Environments
- IoT Security Risk and Challenges
- IoT Security in IoT-Enabled IT Environments
- IoT Security Tools
- IoT Security Best Practices
- IoT Security Standards, Initiatives, and Efforts
Module 9: Administrative Application Security
- Application Whitelisting
- Application Blacklisting
- Application Sandboxing
- Application Patch Management
- Web Application Firewalls (WAFs)
Module 10: Data Security
- Data Security
- Data Encryption Data at Rest
- Data Encryption at Transit
- Data Masking
- Data Backup
- Data Retention
- Data Destruction
- Data Loss Prevention (DLP)
- Data Integrity
Module 11: Enterprise Virtual Network Security
- Network Virtualisation (NV)
- Software-defined Network (SDN)
- Network Function Virtualisation (NFV) Security
- OS Virtualisation Security
- Container Security
- Docker Security
- Kubernetes Security
Module 12: Enterprise Cloud Network Security
- Cloud Computing
- Cloud Security
- Shared Responsibility Model
- Amazon Cloud (AWS) Security
- Microsoft Azure Cloud Security
- Google Cloud Platform (GCP) Security
Module 13: Enterprise Wireless Network Security
- Wireless Network
- Wireless Standards
- Wireless Topologies
- Wireless Network Components
- Wireless Network Encryption
- Wireless Network Authentication
- Wireless Network Security Measures
- Wi-Fi Security Tools
Module 14: Network Traffic Monitoring and Analysis
- Network Traffic Monitoring
- Baseline Traffic Signatures
- Suspicious Network Traffic Signatures
- Threat Detection with Wireshark
- Bandwidth Monitoring
- Performance Monitoring
- Network Anomaly Detection
- Behaviour Analysis
Module 15: Network Logs Monitoring and Analysis
- Logs
- Windows Log Analysis
- Linux Log Analysis
- Mac Log Analysis
- Firewall Log Analysis
- Router Log Analysis
- Web Server Log Analysis
- Centralised Log Management
Module 16: Incident Response and Forensic Investigation
- First Responder
- Incident Handling and Response Process
- SOAR
- Endpoint Detection and Response (EDR)
- Extended Detection and Response (XDR)
- Forensics Investigation
Module 17: Business Continuity and Disaster Recovery
- Business Continuity (BC)
- Disaster Recovery (DR)
- Business Continuity Management (BCM)
- BC/DR Activities
- Business Impact Analysis (BIA)
- Recovery Time Objective (RTO)
- Recovery Point Objective (RPO)
- Business Continuity Plan (BCP)
- Disaster Recovery Plan (DRP)
Module 18: Risk Anticipation with Risk Management
- Risk Management
- Risk Identification
- Risk Assessment
- Risk Treatment
- Risk Treatment Steps
- Risk Tracking and Review
- Risk Management Frameworks (RMFs)
- Vulnerability Management
- Vulnerability Scanning
- Vulnerability Reporting
- Privacy Impact Assessment (PIA)
Module 19: Threat Assessment with Attack Surface Analysis
- Attack Surface
- Attack Surface Analysis
- System Attack Surface
- Network Attack Surface
- Software Attack Surface
- Physical Attack Surface
- Human Attack Surface
- Indicators of Exposures (IoEs)
- Attack Simulation
- Attack Surface Reduction
- Attack Surface Monitoring Tools
- Cloud and IoT Attack Surface Analysis
Module 20: Threat Prediction with Cyber Threat Intelligence
- Cyber Threat Intelligence
- Threat Intelligence Types
- Indicators of Compromise (IoCs)
- Indicators of Attack (IoA)
- Threat Intelligence Layers
- Threat Intelligence Sources
- Threat Intelligence Feeds
- Threat Intelligence Platforms (TIP)
- Threat Hunting
Show more
Who should attend this Certified Network Defender Certification Course?
This CND Course is specifically designed for individuals who are focused on strengthening their capabilities in network defence against cyber threats. It is particularly beneficial for:
- Network Security Professionals
- System Administrators
- Cybersecurity Analysts
- IT Managers and Directors
- Security Engineers
- Network Architects
Prerequisites of the Certified Network Defender Certification Course
There are no formal prerequisites to attend this CND Training Course.
Certified Network Defender Certification Course Overview
A Network Defender is a cybersecurity professional who specialises in protecting networks from intrusion, attacks, and vulnerabilities. Their role is critical as they safeguard information systems from potential threats that can disrupt or damage operations. This training provides organisations with the expertise needed to secure their network infrastructure against cyber threats.
A CND Course is highly beneficial for IT professionals, Network Administrators, and Cybersecurity Analysts who aim to enhance their skills in protecting, detecting, and responding to network threats. It is also valuable for network engineers and security consultants seeking to deepen their knowledge in network defence strategies.
In The Knowledge Academy’s 5-day Certified Network Defender Certification Course, delegates will learn the essential components of network defence, including the implementation of secure architectures and the management of security policies. The course covers a broad range of topics from securing endpoint devices to managing cloud and virtual network environments.
Course Objectives
- To understand network vulnerabilities and implement defence strategies
- To manage and secure endpoint, mobile, and IoT environments
- To deploy and maintain reliable network perimeter defences
- To perform network monitoring and analyse security logs
- To respond to and recover from network security incidents
- To apply risk management principles and practices effectively
After attending this Certified Network Defender Certification Course, delegates will be equipped with the skills to effectively monitor, detect, and respond to network security threats. They will be able to apply best practices in network defence, manage risks associated with cyber threats, and ensure compliance with regulatory requirements.
Show more
What’s included in this Certified Network Defender Training Course?
- Certified Network Defender Exam (312-38)
- World-Class Training Sessions from Experienced Instructors
- Certified Network Defender Certification
- Digital Delegate Pack
Why choose us
Our Birmingham venue
Includes..
Free Wi-Fi
To make sure you’re always connected we offer completely free and easy to access wi-fi.
Air conditioned
To keep you comfortable during your course we offer a fully air conditioned environment.
Full IT support
IT support is on hand to sort out any unforseen issues that may arise.
Video equipment
This location has full video conferencing equipment.
Birmingham is a large city in the West Midlands of England. It is the second largest and second most populous city in the UK behind London. It has an estimated population of nearly 1.2 million people. It is the ninth largest metropolitan area in Europe. The city is a major international commercial centre and an important transport, retail, events and conference hub for England. Education in the UK is a devolved matter, meaning each of the countries that constitute Great Britain each have separate systems operating under separate governments. For example: the UK government is responsible for England, whilst the Scottish government, Welsh government and the Northern Ireland Executive are in charge of their own country.
Popular searched areas in and around Birmingham include:-
- Aston
- Birmingham International Airport
- Bournville
- Castle Bromwich
- Coleshill
- Edgbaston
- Erdington
- Handsworth
- Harborne
- Hockley
- Hollywood
- Kings Norton
- Maypole
- Moseley
- Northfield
- Selly Oak
- Sheldon
- Vauxhall
- Yardley
Birmingham City Council is England's largest local education authority. It is responsible for around 450 schools including nurseries, primary schools, secondary schools and special schools. Most schools are 11-16/18 comprehensive schools while students have the choice of college or sixth form after they have sat their GCSE’s. Bishop Vesey's Grammar School, founded in 1527, is the one of the oldest and perhaps the most prestigious school in the city. Birmingham is a densely populated city for universities with five in the city. These universities are: Aston University, University of Birmingham, Birmingham City University, University College Birmingham and Newman University. There also campuses for the university of law, the BPP University and the Open University West Midlands. There are an estimated 79,000 full time students in the Birmingham area. This is more than any city outside of London in the UK. The University of Birmingham is a highly respected university and is ranked inside the top 100 universities in the world and is a top 15 university in the UK. The motto of this university is “persuasive, persistent and bold.” They claim to encourage and empower to turn their ideas into a reality in order to make things happen. The university has a tradition of innovative research and is always striving to push the boundaries. The Knowledge Academy, we offer over 50,000 classroom based training courses in the UK, including popular locations such as Birmingham.
Show more
Address
Birmingham
T: 01344203999
Enquire now
Ways to take this course
- Classroom
- Online Instructor-led
- Online Self-paced
- Onsite
Experience live, interactive learning from home with The Knowledge Academy's Online Instructor-led Certified Network Defender Certification Training in Birmingham. Engage directly with expert instructors, mirroring the classroom schedule for a comprehensive learning journey. Enjoy the convenience of virtual learning without compromising on the quality of interaction.
- See trainer’s screen
- Virtual whiteboard
- Share documents
- Works on all devices
Enquire now
Learn more in our FAQs
Unlock your potential with The Knowledge Academy's Certified Network Defender Certification Training in Birmingham, accessible anytime, anywhere on any device. Enjoy 90 days of online course access, extendable upon request, and benefit from the support of our expert trainers. Elevate your skills at your own pace with our Online Self-paced sessions.
- Certificates provided online
- Get immediate access on purchase
- Works on all devices
Enquire now
Learn more in our FAQs
Experience the most sought-after learning style with The Knowledge Academy's Certified Network Defender Certification Training in Birmingham. Available in 490+ locations across 190+ countries, our hand-picked Classroom venues offer an invaluable human touch. Immerse yourself in a comprehensive, interactive experience with our expert-led Certified Network Defender Certification Training in Birmingham sessions.
Highly experienced trainers
Boost your skills with our expert trainers, boasting 10+ years of real-world experience, ensuring an engaging and informative training experience
State of the art training venues
We only use the highest standard of learning facilities to make sure your experience is as comfortable and distraction-free as possible
Small class sizes
Our Classroom courses with limited class sizes foster discussions and provide a personalised, interactive learning environment
Great value for money
Achieve certification without breaking the bank. Find a lower price elsewhere? We'll match it to guarantee you the best value
Enquire now
Learn more in our FAQs
Streamline large-scale training requirements with The Knowledge Academy's In-house/Onsite at your business premises. Experience expert-led classroom learning from the comfort of your workplace and engage professional development.
Tailored learning experience
Leverage benefits offered from a certification that fits your unique business or project needs
Maximise your training budget
Cut unnecessary costs and focus your entire budget on what really matters, the training.
Team building opportunity
Our offers a unique chance for your team to bond and engage in discussions, enriching the learning experience beyond traditional classroom settings
Monitor employees progress
The course know-how will help you track and evaluate your employees' progression and performance with relative ease
Enquire now
Learn more in our FAQs
What our customers are saying
Certified Network Defender Certification Training in Birmingham FAQs
What time shall I arrive at the venue?
Please arrive at the venue at 8:45am.
Do you offer support for the course?
We are able to provide support via phone & email prior to attending, during and after the course.
What is included in the course?
Delegate pack consisting of course notes and exercises, Experienced Instructor.
What is the duration of this course?
This course is [5] day(s)
How long until I receive the course confirmation details?
Once your booking has been placed and confirmed, you will receive an email which contains your course location, course overview, pre-course reading material (if required), course agenda and payment receipts
Which is the best training institute/provider of Certified Network Defender Certification in Birmingham?
The Knowledge Academy is the Leading global training provider for Certified Network Defender Certification.
What are the best EC – Council Certification Training courses in Birmingham?
Please see our EC – Council Certification Training courses available in Birmingham
Show more
Why choose us
Best price in the industry
You won't find better value in the marketplace. If you do find a lower price, we will beat it.
Many delivery methods
Flexible delivery methods are available depending on your learning style.
High quality resources
Resources are included for a comprehensive learning experience.
"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"
Joshua Davies, Thames Water
Related courses
Certified EU General Data Protection Regulation (EU GDPR) Foundation and Practitioner CISSP Certification CISA Certified Information Systems Auditor CISM Certified Information Security Manager CCSP Certified Cloud Security Professional