EC-Council Certified Network Defender (CND)
- Module 1: Network Attacks and Defense Strategies
– Understanding Essential Terminologies in Network Security Attacks
– Examples of Network-Level Attack Techniques
– Examples of Application-Level Attack Techniques
– Examples of Social Engineering Attack Techniques
– Examples of Email Attack Techniques
– Examples of Mobile Device-Specific Attack Techniques
– Examples of Cloud-Specific Attack Techniques
– Examples of Wireless Network-Specific Attack Techniques
– Attacker’s Hacking Methodologies and Frameworks
– Fundamental Goals, Benefits, and Challenges in Network Defense
– Continual/Adaptive Security Strategy
– Defense-in-Depth Security Strategy
Module 2: Administrative Network Security
– Compliance with Regulatory Frameworks and Standards
– Regulatory Frameworks, Laws, and Acts
– Designing and Developing Security Policies
– Conducting Security and Awareness Training
– Implementing Administrative Security Measures
Module 3: Technical Network Security
– Access Control Principles, Terminologies, and Models
– Access Control in Today’s Distributed and Mobile Computing World
– Identity and Access Management (IAM)
– Cryptographic Security Techniques and Algorithms
– Network Segmentation Techniques
– Essential Network Security Solutions and Protocols
Module 4: Network Perimeter Security
– Firewall Security Concerns, Capabilities, and Limitations
– Types of Firewall Technologies and Usage
– Firewall Topologies and Usage
– Distinctions Between Various Types of Firewalls
– IDS Deployment and Best Practices
– Router and Switch Security Measures
– Zero Trust Model Security Using Software-Defined Perimeter (SDP)
Module 5: Endpoint Security – Windows Systems
– Windows OS Security Concerns and Components
– Windows Security Baseline Configurations
– Windows User Account and Password Management
– Windows Patch Management
– Windows Active Directory Security Best Practices
– Windows Network Services and Protocol Security
Module 6: Endpoint Security – Linux Systems
– Linux OS Security Concerns, Installation, and Patching
– Linux OS Hardening Techniques
– Linux User Access and Password Management
– Linux Network Security and Remote Access
– Linux Security Tools and Frameworks
Module 7: Endpoint Security – Mobile Devices
– Enterprise-Level Mobile Usage Policies and Security Guidelines
– Security Management Solutions for Mobile Platforms
– Security Guidelines and Tools for Android and iOS Devices
Module 8: Endpoint Security – IoT Devices
– Understanding IoT Devices and Application Areas
– Security Challenges and Measures in IoT-Enabled Environments
– IoT Security Tools and Best Practices
Module 9: Administrative Application Security
– Application Whitelisting and Blacklisting
– Application Sandboxing
– Application Patch Management
– Web Application Firewall (WAF)
Module 10: Data Security
– Data Access Controls
– Encryption of Data at Rest and in Transit
– Data Masking, Backup, Retention, and Destruction
– Data Loss Prevention Concepts
Module 11: Enterprise Virtual Network Security
– Network and Security Management in Modern Virtualized IT Environments
– Virtualization Essential Concepts
– Network Virtualization (NV) Security
– SDN, NFV, and OS Virtualization Security
– Security Guidelines and Best Practices for Containers, Dockers, and Kubernetes
Module 12: Enterprise Cloud Security
– Cloud Computing Fundamentals and Insights
– Evaluating Cloud Service Providers for Security
– Security in Amazon, Microsoft Azure, and Google Cloud Platform
– General Security Best Practices for Cloud Services
Module 13: Wireless Network Security
– Wireless Network Fundamentals, Encryption, and Authentication
– Implementing Wireless Network Security Measures
Module 14: Network Traffic Monitoring and Analysis
– Advantages of Network Traffic Monitoring
– Setting Up Network Monitoring Environment
– Network Traffic Analysis Using Wireshark
– Bandwidth Monitoring Tools and Techniques
Module 15: Network Logs Monitoring and Analysis
– Logging Concepts and Analysis on Windows, Linux, Mac, Firewall, Routers, and Web Servers
– Centralized Log Monitoring and Analysis
Module 16: Incident Response and Forensic Investigation
– Incident Response and Forensics Investigation Concepts and Processes
Module 17: Business Continuity and Disaster Recovery
– Business Continuity and Disaster Recovery Activities, Plans, and Standards
Module 18: Risk Management and Vulnerability Assessment
– Risk Management Concepts and Frameworks
– Vulnerability Management and Assessment
Module 19: Threat Assessment with Attack Surface Analysis
– Understanding and Reducing Attack Surface
– Attack Surface Analysis for Cloud and IoT Environments
Module 20: Threat Prediction with Cyber Threat Intelligence
– Role and Consumption of Cyber Threat Intelligence for Proactive Defense
– Types and Layers of Threat Intelligence
– Indicators of Threat Intelligence