EC-Council Network Defense Essentials (NDE)
Module 01: Fundamentals of Securing Networks
Understanding the Basics of Network Security
Protocols for Ensuring Network Security
Module 02: Verification, Validation, and Permission
Principles, Vocabulary, and Models for Access Control
Concepts of Identity and Access Management (IAM)
Module 03: Managing Network Security – Administrative Approach
Understanding Regulatory Frameworks, Laws, and Acts
Creating and Implementing Security Policies
Conducting Various Types of Security and Awareness Training
Module 04: Managing Network Security – Physical Measures
Significance of Physical Security
Implementing Physical Security Measures
Security in the Workplace
Environmental Controls for Security
Module 05: Managing Network Security – Technical Solutions
Different Methods for Network Segmentation
Role of Various Firewalls
Understanding IDS/IPS and their Functions
Types and Functions of Honeypots
Benefits of Various Proxy Servers
Essential Aspects of VPN in Network Security
Security Incident and Event Management (SIEM)
User Behavior Analytics (UBA)
Understanding Antivirus and Anti-Malware Software
Module 06: Virtualization and Cloud Security
Key Concepts of Virtualization and OS
Ensuring Security in Virtualized Environments
Essential Understanding of Cloud Computing
Insights into Cloud Security and Best Practices
Module 07: Security of Wireless Networks
Basics of Wireless Networking
Mechanisms for Wireless Network Encryption
Various Methods for Wireless Network Authentication
Implementing Security Measures for Wireless Networks
Module 08: Security of Mobile Devices
Different Methods for Connecting Mobile Devices
Concepts of Mobile Device Management
Common Usage Policies for Mobile Devices in Enterprises
Security Risks and Guidelines for Enterprise Mobile Usage Policies
Implementing Enterprise-level Mobile Security Management Solutions
Implementing General Security Guidelines and Best Practices on Mobile Platforms
Module 09: Security of IoT Devices
Understanding IoT Devices, Applications, and Communication Models
Security Measures for IoT-enabled Environments
Module 10: Cryptography and Public Key Infrastructure (PKI)
Various Cryptographic Techniques
Different Cryptographic Algorithms
Tools for Cryptography
Understanding Public Key Infrastructure (PKI)
Module 11: Ensuring Data Security
Importance of Data Security
Controls for Data Encryption
Data Backup and Retention
Concepts of Data Loss Prevention
Module 12: Monitoring Network Traffic
Importance and Advantages of Network Traffic Monitoring
Establishing Baseline Traffic Signatures for Normal and Suspicious Network Traffic
Conducting Network Monitoring for Suspicious Traffic