Preparation Course: Certified Network Defender
This program enables
participants to handle the issues of Cybersecurity.
Whereas. Cybersecurity now dominates the
priorities of every enterprise striving to adapt to a post-COVID world. Forced
to go remote, their workers’ identities and devices are the new security
perimeter. Cybersecurity for business is now as critical as internet access
itself.
Studies and news
reports have demonstrated that cyber attackers quickly attack the new,
unprotected threat surfaces created when millions of employees start working
from home. Providing network security to such an unprecedented, distributed
ecosystem in this post-pandemic world is every Network Defense Team’s acid
test. Cybersecurity is a continuous, non-linear process. Therefore, your
approach to mitigating cyber risks cannot be static. This is particularly
important when the new “normal” has millions of employees working from remote
locations on fragile, home-based WiFi networks and sanitized personal devices.
By the
end of this course, participants will be able to:
- Implement an Adaptive Security Strategy, thereby increasing the
scope from Protect – Detect – Respond to Protect – Detect – Respond –
Predict.
- Understand and deal with the Latest Technologies such as Software
Defined Network (SDN) security, Network Function Virtualization (NFV)
security, container security, docker security, and Kubernetes security.
- Establish A Dedicated Module on IoT Security
- Understand network security management.
- Learn basics of first response and forensics
- Establish network security policies and procedures.
- Understand indicators of Compromise, Attack, and Exposures (IoC,
IoA, IoE)
- Perform the tasks related to Windows and Linux security
administration.
- Build threat intelligence capabilities
- Set up mobile and IoT device security
- Establish and monitor log management
- Implement data security techniques on networks
- Implement endpoint security
- Embed virtualization technology security
- Configure optimum firewall solutions
- Establish Network Authentication, Authorization, Accounting (AAA)
Course Curriculum
- Network Attacks and Defense Strategies
- Administrative Network Security
- Technical Network Security
- Network Perimeter Security
- Endpoint Security-Windows Systems
- Endpoint Security-Linux Systems
- Endpoint Security- Mobile Devices
- Endpoint Security-IoT Devices
- Administrative Application Security
- Data Security
- Enterprise Virtual Network Security
- Enterprise Cloud Network Security
- Enterprise Wireless Network Security
- Network Traffic Monitoring and Analysis
- Network Logs Monitoring and Analysis
- Incident Response and Forensic Investigation
- Business Continuity and Disaster Recovery
- Risk Anticipation with Risk Management
- Threat Assessment with Attack Surface Analysis
- Threat Prediction with Cyber Threat Intelligence
Instructor
Trainees Feedback
Reviews