Course Overview
C|ND prepares network defenders with strategic, tactical, and operational network security capabilities, enabling them to design, develop, and maintain secure networks.
Who should attend
- Network Administrators
 - Network Security Administrators
 - Network Engineer
 - Data Security Analyst
 - Network Security Engineer
 - Network Defense Technician
 - Security Analyst
 - Security Operator
 - Network security
 - Cybersecurity Engineer
 
Prerequisites
Basic Knowledge in Networking Concepts
Course Objectives
- Plan, implement, and administer network security management for an organization.
 - Gain knowledge of various security risks, threats, and vulnerabilities.
 - Assist in obtaining and maintaining an organization's compliance with required regulatory standards and frameworks.
 - Design and implement network security policies and procedures .
 - Apply security principles, protocols, and controls that suit today's distributed and mobile computing environment.
 - Apply strong Identity and Access Management (IAM), network segmentation, and encryption techniques to strengthen the organization's network.
 - Manage and maintain Windows Security Administration.
 - Manage and maintain Linux Security Administration.
 - Manage and mitigate the security risks and challenges associated with the enterprise's mobile device usage policies.
 - Manage and mitigate the security risks and challenges associated with IoT devices used in enterprises.
 - Implement strong data security techniques to secure an organization's data.
 - Implement and manage the security of virtualization technologies, i.e., Network Virtualization (NV), Software Defined Network (SDN),
 - Network Function Virtualization (NFV), OS Virtualization, Containers, Dockers, and Kubernetes used in modern-day networks.
 - Implement and manage cloud security on various cloud platforms such as AWS, Azure, Google Cloud Platform, etc.
 - Implement and manage wireless network security.
 - Perform risk assessment and vulnerability assessment/scanning through various scanning tools and generate detailed reports.
 - Identify the critical data and choose an appropriate backup method, media, and technique to regularly perform a successful backup of organization data.
 - Provide a first response to the network security incident and assist the IRT and forensics investigation teams in dealing with an incident.
 - Identify the Indicators of Compromise (IoC) and Indicators of Attack (IoA) on networks .
 - Integrate threat intelligence capabilities to leverage/consume threat intelligence for proactive defense.
 - Conduct attack surface analysis by identifying Indicators of Exposures (IoE).
 - Assist in Business Continuity (BC) and Disaster Recovery (DR) planning.
 - Monitor network traffic and ensure its security .
 - Perform log management.
 - Monitor network logs against any anomalies.
 - Manage proxy and content filtering .
 - Troubleshoot the network for various network problems.
 - Identify various threats to an organization’s network .
 - Harden security of various endpoints individually in the organization’s network .
 - Select the appropriate firewall solution, topology, and configurations to harden security through the firewall.
 - Determine an appropriate location for IDS/IPS sensors, tuning IDS for false positives and false negatives, and configurations to harden security through IDPS technologies
 - Maintain the inventory of computers, servers, terminals, modems, and other access devices .
 - Provide security awareness guidance and training.
 - Add, remove, or update user account information.
 - Apply operating system updates and patches and make configuration changes.
 - Update system configurations to maintain an updated security posture using current patches, device and operating system hardening techniques, and access control lists.
 - Manage network authentication, authorization, and accounting (AAA) for network devices.
 - Review audit logs from the Firewall, IDS/IPS, servers, and hosts on the internal, protected network.
 - Analyze, troubleshoot, and investigate security-related information systems’ anomalies based on the security platform.
 - Maintain, configure, and analyze network and host-based security platforms.
 - Evaluate security products as well as security operations procedures and processes.
 - Identify and classify organizational assets, including hardware, software, data, and critical infrastructure.
 - Implement system integrity monitoring tools and techniques to identify alterations in critical files, configurations, or system states.
 - Understand the role and functionality of EDR/XDR solutions implemented to contain and remediate threats.
 - Understand the role and functionality of UEBA solutions implemented to monitor and analyze user and entity activities for anomalous behavior patterns.
 - Conduct PIA processes to evaluate and assess the potential impact of new systems, processes, or initiatives on individual privacy.
 - Collaborate with security teams to enhance threat-hunting strategies and incident response capabilities.
 - Understand the role of Security Orchestration, Automation, and Response (SOAR) platforms in cybersecurity operations.
 - Plan and execute the integration of zero trust principles into existing security architectures and infrastructures.
 - Stay updated about the newly emerging cyber threats with the help of the latest cybersecurity news, industry publications, and reputable sources of information, including security blogs, research reports, and whitepapers.
 - Understand the role of AI/ML in enhancing cyber defense, threat detection, and response.
 
Course Content
- Network Attacks and Defense Strategies
 - Administrative Network Security
 - Technical Network Security
 - Network Perimeter Security
 - Endpoint Security-Windows Systems
 - Endpoint Security-Linux Systems
 - Endpoint Security- Mobile Devices
 - Endpoint Security-IoT Devices
 - Administrative Application Security
 - Data Security
 - Enterprise Virtual Network Security
 - Enterprise Cloud Network Security
 - Enterprise Wireless Network Security
 - Network Traffic Monitoring and Analysis
 - Network Logs Monitoring and Analysis
 - Incident Response and Forensic Investigation
 - Business Continuity and Disaster Recovery
 - Risk Anticipation with Risk Management
 - Threat Assessment with Attack Surface Analysis
 - Threat Prediction with Cyber Threat Intelligence
 
APPENDIX (Self-Study)
- APPENDIX A: Computer Network Fundamentals
 - APPENDIX B: Physical Network Security
 - APPENDIX C: Virtual Private Network (VPN) Security
 - APPENDIX D: Endpoint Security – MAC Systems