SlideShare a Scribd company logo
1 of 14
CERTIFIED NETWORK DEFENDER
Protect. Detect. Respond. Predict.
Certified Network Defender
CND
TM
CERTIFIED NETWORK DEFENDER 01
Certified Network Defender v2
The only true blue teem network defense progrem!
Cybersecurity now dominates the priorities of every enterprise striving to adapt to a post-COVID
world. Forced to go remote, their workers’ identities and devices are the new security perimeter.
In fact, cybersecurity for business is now as critical as internet access itself.
The only progrem built for the world's lergest work−from−home experiment!
Studies and news reports had demonstrated that cyber attackers are quick to attack the new,
unprotected threat surfaces created when millions of employees started working from home.
Providing network security to such an unprecedented, distributed ecosystem in this post-
pandemic world is every Network Defense Team’s acid test.
The Certified Network Defender v2 program has been upgraded and loaded with battle-ready
ammunition to help Blue Teams defend and win the war against network breaches. Individuals
and corporations looking to strengthen their Network Defense Skills will find CND v2 a must-have
for 5 reasons:
Only comprehensive network defense progrem built to incorporete criticel
secure network skills−Protect, Detect,Respond end Predict
Meps to NICE2.0Fremework
Comes pecked withthe letesttools,technologies,end techniques
Deploys e hends−on epproech to leerning
Designed with en enhenced focus on Threet Prediction, Business Continuity
end Disester Recovery
CERTIFIED NETWORK DEFENDER 02
An Adeptive Security Stretegy —Protect, Detect, Respond, end Predict
Cybersecurity is a continuous, non-linear process. Therefore, your approach to mitigating
cyber risks cannot be static. This is particularly important when the new “normal” has millions
of employees working from remote locations on fragile, home-based WiFi networks and non-
sanitized personal devices.
According to Gartner, traditional “prevent and detect” approaches are inadequate. Opportunistic
by nature, malicious actors look for the easiest ways to attack the most users and siphon off
the maximum gains. Developing a continuous Adaptive Security Cycle helps organizations stay
ahead of cybercriminals by creating and improving security systems. Enter CND v2.
Protect
Respond
Detect
Predict
• Defense-In-Depth Security
• Properly Designed, Implemented,
and Enforced Security Policies
• Security Architectures
• Appropriate Configuration
• Right Selection of Security
Controls
• Incident Response
• Forensics Investigation
• Business Continuity (BC)
• Disaster Recovery (DR)
• Traffic Monitoring
• Log Management
• Log Monitoring
• Anomalies Detection
• Risk and Vulnerability Assessment
• Attack Surface Analysis
• Threat Intelligence
CERTIFIED NETWORK DEFENDER 03
AsHends−OnesNetworkDefenseCen Get
Creeted besed on e thorough job tesk enelysis
CND v2 is based on the cybersecurity education framework and work role task analysis presented
by the National Infocomm Competency Framework (NICF). The program is also mapped to the
Department of Defense (DoD) roles for system/network administrators as well as global work
roles and responsibilities laid out by the revised NICE Framework 2.0
Adeptive Security Stretegy
CND v2 includes the Adaptive Security Strategy, thereby increasing the scope from
Protect – Detect – Respond to Protect – Detect – Respond – Predict.
Increesed Leb Time end Hends−On Focus
More than 50% of the CND v2 program is dedicated to practical skills in live ranges
via EC-Council labs covering domains like Network Defense Management, Network
Perimeter Protection, Endpoint Protection, Application and Data Protection,
Enterprise Virtual, Cloud, and Wireless Network Protection, Incident Detection and
Response, and Threat Prediction.
A Dediceted Module on IoTSecurity
IoT security, previously ignored, is now an issue of great concern. IoT devices are
not primarily designed with security in mind. This leaves serious vulnerabilities
while configuring IoT devices in a network. CND v2 introduces candidates to the
various challenges that IoT devices pose and the measures required to mitigate
them.
Network Virtuelizetion Prectices for the Remote Workforce
Tracking security applications and configurations of remote work environments
as workforce span across servers is very difficult. The CND v2 program teaches
candidates to implement and manage the security of virtualization technologies
Network Virtualization (NV), Software-Defined Network (SDN), Network Function
Virtualization (NFV), OS Virtualization, Containers, Dockers, Kubernetes used in
modern-day networks.
CERTIFIED NETWORK DEFENDER 04
An Upgrede on Mobile Security Meesures
Research firm Gartner predicts that by 2021, 27% of corporate data traffic will
bypass perimeter security and flow directly from mobile and portable devices to
the cloud. With the CND v2, you will learn Enterprise Mobile Device Security, Redefine
Access Control Security, and other platforms to ensure that this endpoint remains
secure.
Enhenced Focus on Cloud Security
While the adoption of cloud computing in organizations has increased, so have
the challenges. Candidates will learn different ways to ensure security across
various cloud platforms - AWS, Microsoft Azure Cloud, and Google Cloud Platform.
An Introduction to Threet Intelligence
Having a proactive approach to security is the new requirement of all organizations.
Without threat intelligence, your cybersecurity posture is only reactive. CND v2
helps you take a more effective, proactive approach using threat intelligence.
In−DepthAtteck Surfece Anelysis
The key to cyber risk management is in-depth attack surface analysis. CND v2 trains
you to identify what parts of your organization need to be reviewed and tested for
security vulnerabilities, and how to reduce, prevent, and mitigate network risks.
Includes the Letest Technology
CND v2 covers the latest technologies such as Software Defined Network (SDN)
security, Network Function Virtualization (NFV) security, container security, docker
security, and Kubernetes security.
CERTIFIED NETWORK DEFENDER 05
About the Exem
CERTIFIED NETWORK DEFENDER 06
Number of Questions: 100
Test Delivery: ECCEXAM Exam Prefix: 312−38(ECCEXAMʜ
Test Duration: 4 Hours Test Format: Multiple Choice
Pessing score
In order to maintain the high integrity of our certification exams, EC-Council Exams are provided in
multiple forms (i.e., different question banks). Each form is carefully analyzed through beta testing
with an appropriate sample group under the guidance of a committee of subject matter experts.
This approach ensures our exams offer academic difficulty, as well as “real world” applications.
We also have a process to determine the difficulty rating of each question. The individual rating
then contributes to an overall “Cut Score” for each exam form. To ensure each form adheres to
assessment standards, Cut Scores are set on a “per exam form” basis. Depending on which exam
form is challenged, Cut Scores can range from 60% to 85%
Course Outline
CERTIFIED NETWORK DEFENDER 07
Module 01 Network Attacks and Defense Strategies
Module 02 Administrative Network Security
Module 03 Technical Network Security
Module 04 Network Perimeter Security
Module 05 Endpoint Security-Windows Systems
Module 06 Endpoint Security-Linux Systems
Module 07 Endpoint Security- Mobile Devices
Module 08 Endpoint Security-IoT Devices
Module 09 Administrative Application Security
Module 10 Data Security
Module 1
1 Enterprise Virtual Network Security
Module 12 Enterprise Cloud Network Security
Module 13 Enterprise Wireless Network Security
Module 14 Network Traffic Monitoring and Analysis
Module 15 Network Logs Monitoring and Analysis
Module 16 Incident Response and Forensic Investigation
Module 1
7 Business Continuity and Disaster Recovery
Module 18 Risk Anticipation with Risk Management
Module 19 Threat Assessment with Attack Surface Analysis
Module 20 Threat Prediction with Cyber Threat Intelligence
Whet will you leern?
Understanding network security
management
Learn basics of first response and
forensics
Building threat intelligence capabilities
Establishing and monitoring log
management
Implementing endpoint security
Configuring optimum firewall solutions
Understanding and using IDS/IPS
technologies
Establishing Network Authentication,
Authorization, Accounting (AAA)
Understanding indicators of
Compromise, Attack, and Exposures
(IoC, IoA, IoE)
Establishing network security policies
and procedures
Windows and Linux security
administration
Embedding virtualization technology
security
Determining cloud and wireless security
Deploying and using risk assessment
tools
Setting up mobile and IoT device
security
Implementing data security techniques
on networks
CERTIFIED NETWORK DEFENDER 08
Who isit for?
CND v2 is for those who work in the network administration/cybersecurity domain in the
capacity of Network Administrator/Engineer, Network Security Administrator/Engineer/Analyst,
Cybersecurity Engineer, Security Analyst, Network Defense Technician, Security Operator. CND v2
is for all cybersecurity operations, roles, and anyone looking to build a career in cybersecurity.
Suggested Duretion: 5 Deys (9:00 AM —5:00 P
M
ʜ
Eligibility Criterie
To be eligible to challenge the EC-Council CND certification examination, the candidate has two
options:
Attend Officiel Network Security Treining by EC−Council:
If a candidate has completed an official EC-Council training either at an Accredited Training
Center, via the iClass platform, or at an approved academic institution, the candidate is eligible
to challenge the relevant EC-Council exam without going through the application process.
Attempt the Exem without Officiel EC−Council Treining:
In order to be considered for the EC-Council CND v2 exam without attending official network
security training, the candidate must have at least 2 years of work experience in the Information
Security domain. If the candidate has the required work experience, they can submit an eligibility
application form along with USD 100.00, a non-refundable fee.
CERTIFIED NETWORK DEFENDER 09
Treining options
iLeern (Self−Studyʜ
This solution is a self-directed study environment to deliver
EC-Council's CND v2 program in a streaming video format.
CERTIFIED NETWORK DEFENDER 10
iWeek (LiveOnlineʜ
This solution provides live, online, instructor-led CND v2
training. You can attend it from anywhere as long as you have
an internet connection.
Mestercless
This solution offers you the opportunity to learn Certified
Network Defender from the world-class instructors in
collaboration with top information security professionals.
Treining Pertner (Instructor−led Treiningʜ
CND v2 is available globally through EC-Council's Authorized
Training Partners and are conveniently located in your area
and offers you the benefit of learning through experienced
certified EC-Council instructors along with your peers, gaining
the real-world skills together.
Educetion Pertner (In−Person or Onlineʜ
This solution offers CND v2 through EC-Council Academia
Partner institutions and is for students enrolled in the applicable
college or university degree programs.
Accreditetions, Recognitions, end Endorsements
American National Standards
Institute (ANSI)
Government
Communications
Headquarters (GCHQ)
United States Department
of Defense (DoD)
National Infocomm
Competency Framework
(NICF)
CERTIFIED NETWORK DEFENDER 11
Testimoniels
EC-Council offers thorough programs with elaborate training content. My learning
from the CertiЁed Network Defender (C/ND) program helped me in my professional
life. With this obtained knowledge, I was able to analyze the vulnerabilities in our
organization’s network security. I also contributed my inputs to strengthen the
existing security infrastructure at my workplace.
- Raymond Philip Gamboa
Assistant Manager - Service Operations,
Daimler Mobility AG, Singapore
CERTIFIED NETWORK DEFENDER 12
For me, EC-Council’s CertiЁed Network Defender (C/ND) program covered the
whole network security domain. It is a vendor-neutral, comprehensive program
focusing network protocols, controls, vulnerabilities, devices, and much more. The
program includes hands-on labs to offer a better understanding of all the major
network security tools and techniques.
- George L. S.
Endpoint Protection/ACAS Administrator,
Jacobs, USA
For all those, who are passionate to learn network security, your Ёrst stop should be
EC-Council CertiЁed Network Defender (C/ND). The C/ND courseware helped me
understand the different modules in the program. Plus, there is no other training
program that can cover this domain with such information. I wouldn’t have been
able to attain the C/NDcredential without going through this advanced training. My
experience involves high-quality labs, brilliant content delivery by an experienced
instructor, and encyclopedic knowledge of the domain. It also covered various
important networking topics which made this entire learning experience very
relatable to real-world scenarios. After this, I am planning on progressing further
through the path of credentials.
- Geoffrey Chisnall
Network Security Administrator,
Experian, South Africa
My experience with EC-Council beginning from the Ёrst training in 20l5, until now
has been an excellent opportunity. The courseware and the training material, when
compared to other vendor training courses, are much better, improving over the
years with every new version update and credential release.
- Ivica Gjorgjevski
Head of Department for Security Accreditation of ClassiЁed information and ICT support,
Directorate for Security of ClassiЁed Information, North Macedonia
CERTIFIED NETWORK DEFENDER 13
After Ёnishing my contract with the Army, New Horizons Computer Learning
Centers offered me career training in Cybersecurity. I wanted to take up EC-
Council‘s CertiЁed Network Defender (C/ND) because of its massive amount of
training material. Iwas thrilled to be able to learn and test my abilities in different
network security concepts. Ifound its source material well written and full of new
information. The C/ND training reminded me always to stay vigilant. Never stop
learning because there’s always something new out there to discover.
Kenneth P.
Researcher
IEEE, Spain
EC-Council
w w w . e c co u nc il. or g

More Related Content

Similar to Cyber security course in Kerala , Kochi

8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdfMetaorange
 
Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...journalBEEI
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptxMetaorange
 
"Exploring the Diverse World of CCNP Certifications" .pdf
"Exploring the Diverse World of CCNP Certifications"  .pdf"Exploring the Diverse World of CCNP Certifications"  .pdf
"Exploring the Diverse World of CCNP Certifications" .pdfarjunnegi34
 
DESIGNS & IMPLEMENTATIONS TO OVERCOME CHALLENGES IN THE UTILITY INDUSTRY
DESIGNS & IMPLEMENTATIONS TO OVERCOME CHALLENGES IN THE UTILITY INDUSTRYDESIGNS & IMPLEMENTATIONS TO OVERCOME CHALLENGES IN THE UTILITY INDUSTRY
DESIGNS & IMPLEMENTATIONS TO OVERCOME CHALLENGES IN THE UTILITY INDUSTRYiQHub
 
Vulnerability threat and attack
Vulnerability threat and attackVulnerability threat and attack
Vulnerability threat and attacknewbie2019
 
The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443WoMaster
 
Literature Review on DDOS Attacks Detection Using SVM algorithm.
Literature Review on DDOS Attacks Detection Using SVM algorithm.Literature Review on DDOS Attacks Detection Using SVM algorithm.
Literature Review on DDOS Attacks Detection Using SVM algorithm.IRJET Journal
 
Robust Cyber Security for Power Utilities
Robust Cyber Security for Power UtilitiesRobust Cyber Security for Power Utilities
Robust Cyber Security for Power UtilitiesNir Cohen
 
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022Ulrich Seldeslachts
 
Private sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodesPrivate sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodesOllie Whitehouse
 
The Challenge of Integrating Security Solutions with CI.pdf
The Challenge of Integrating Security Solutions with CI.pdfThe Challenge of Integrating Security Solutions with CI.pdf
The Challenge of Integrating Security Solutions with CI.pdfSavinder Puri
 
Networking Course in bangalore | CCNA training Institute
Networking Course in bangalore | CCNA training InstituteNetworking Course in bangalore | CCNA training Institute
Networking Course in bangalore | CCNA training InstituteNetworking Training
 
Insecure magazine - 52
Insecure magazine - 52Insecure magazine - 52
Insecure magazine - 52Felipe Prado
 

Similar to Cyber security course in Kerala , Kochi (20)

8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf
 
Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx
 
"Exploring the Diverse World of CCNP Certifications" .pdf
"Exploring the Diverse World of CCNP Certifications"  .pdf"Exploring the Diverse World of CCNP Certifications"  .pdf
"Exploring the Diverse World of CCNP Certifications" .pdf
 
DESIGNS & IMPLEMENTATIONS TO OVERCOME CHALLENGES IN THE UTILITY INDUSTRY
DESIGNS & IMPLEMENTATIONS TO OVERCOME CHALLENGES IN THE UTILITY INDUSTRYDESIGNS & IMPLEMENTATIONS TO OVERCOME CHALLENGES IN THE UTILITY INDUSTRY
DESIGNS & IMPLEMENTATIONS TO OVERCOME CHALLENGES IN THE UTILITY INDUSTRY
 
Vulnerability threat and attack
Vulnerability threat and attackVulnerability threat and attack
Vulnerability threat and attack
 
The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443
 
Literature Review on DDOS Attacks Detection Using SVM algorithm.
Literature Review on DDOS Attacks Detection Using SVM algorithm.Literature Review on DDOS Attacks Detection Using SVM algorithm.
Literature Review on DDOS Attacks Detection Using SVM algorithm.
 
Robust Cyber Security for Power Utilities
Robust Cyber Security for Power UtilitiesRobust Cyber Security for Power Utilities
Robust Cyber Security for Power Utilities
 
nsx overview with use cases 1.0
nsx overview with use cases 1.0nsx overview with use cases 1.0
nsx overview with use cases 1.0
 
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
 
Private sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodesPrivate sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodes
 
resume IT security
resume IT securityresume IT security
resume IT security
 
The Challenge of Integrating Security Solutions with CI.pdf
The Challenge of Integrating Security Solutions with CI.pdfThe Challenge of Integrating Security Solutions with CI.pdf
The Challenge of Integrating Security Solutions with CI.pdf
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Networking Course in bangalore | CCNA training Institute
Networking Course in bangalore | CCNA training InstituteNetworking Course in bangalore | CCNA training Institute
Networking Course in bangalore | CCNA training Institute
 
Cloud Security Solution Overview
Cloud Security Solution OverviewCloud Security Solution Overview
Cloud Security Solution Overview
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
 
Insecure magazine - 52
Insecure magazine - 52Insecure magazine - 52
Insecure magazine - 52
 

More from amallblitz0

Cyber security course in Kerala, Kochi.pdf
Cyber security course in Kerala, Kochi.pdfCyber security course in Kerala, Kochi.pdf
Cyber security course in Kerala, Kochi.pdfamallblitz0
 
Best Interior Designing Course in Kerala | Enroll Now!.ppt
Best Interior Designing Course in Kerala | Enroll Now!.pptBest Interior Designing Course in Kerala | Enroll Now!.ppt
Best Interior Designing Course in Kerala | Enroll Now!.pptamallblitz0
 
Top Interior Designing Course in Kochi | Blitz Academy.pdf
Top Interior Designing Course in Kochi | Blitz Academy.pdfTop Interior Designing Course in Kochi | Blitz Academy.pdf
Top Interior Designing Course in Kochi | Blitz Academy.pdfamallblitz0
 
Mechanical QA QC course in Kerala | 100% Placement.pdf
Mechanical QA QC course in Kerala | 100% Placement.pdfMechanical QA QC course in Kerala | 100% Placement.pdf
Mechanical QA QC course in Kerala | 100% Placement.pdfamallblitz0
 
Best logistics courses in kerala | Logistics courses in kochi.pdf
Best logistics courses in kerala | Logistics courses in kochi.pdfBest logistics courses in kerala | Logistics courses in kochi.pdf
Best logistics courses in kerala | Logistics courses in kochi.pdfamallblitz0
 
Logistics institute in kochi | Logistics courses in kerala .pptx
Logistics institute in kochi | Logistics courses in kerala  .pptxLogistics institute in kochi | Logistics courses in kerala  .pptx
Logistics institute in kochi | Logistics courses in kerala .pptxamallblitz0
 
Piping and Pipeline Engineering Courses in Kerala | Blitz Academy.pdf
Piping and Pipeline Engineering Courses in Kerala | Blitz Academy.pdfPiping and Pipeline Engineering Courses in Kerala | Blitz Academy.pdf
Piping and Pipeline Engineering Courses in Kerala | Blitz Academy.pdfamallblitz0
 
Cyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz AcademyCyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz Academyamallblitz0
 
Cyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz AcademyCyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz Academyamallblitz0
 
Cyber security course in Kerala, Kochi
Cyber  security  course in Kerala, KochiCyber  security  course in Kerala, Kochi
Cyber security course in Kerala, Kochiamallblitz0
 

More from amallblitz0 (10)

Cyber security course in Kerala, Kochi.pdf
Cyber security course in Kerala, Kochi.pdfCyber security course in Kerala, Kochi.pdf
Cyber security course in Kerala, Kochi.pdf
 
Best Interior Designing Course in Kerala | Enroll Now!.ppt
Best Interior Designing Course in Kerala | Enroll Now!.pptBest Interior Designing Course in Kerala | Enroll Now!.ppt
Best Interior Designing Course in Kerala | Enroll Now!.ppt
 
Top Interior Designing Course in Kochi | Blitz Academy.pdf
Top Interior Designing Course in Kochi | Blitz Academy.pdfTop Interior Designing Course in Kochi | Blitz Academy.pdf
Top Interior Designing Course in Kochi | Blitz Academy.pdf
 
Mechanical QA QC course in Kerala | 100% Placement.pdf
Mechanical QA QC course in Kerala | 100% Placement.pdfMechanical QA QC course in Kerala | 100% Placement.pdf
Mechanical QA QC course in Kerala | 100% Placement.pdf
 
Best logistics courses in kerala | Logistics courses in kochi.pdf
Best logistics courses in kerala | Logistics courses in kochi.pdfBest logistics courses in kerala | Logistics courses in kochi.pdf
Best logistics courses in kerala | Logistics courses in kochi.pdf
 
Logistics institute in kochi | Logistics courses in kerala .pptx
Logistics institute in kochi | Logistics courses in kerala  .pptxLogistics institute in kochi | Logistics courses in kerala  .pptx
Logistics institute in kochi | Logistics courses in kerala .pptx
 
Piping and Pipeline Engineering Courses in Kerala | Blitz Academy.pdf
Piping and Pipeline Engineering Courses in Kerala | Blitz Academy.pdfPiping and Pipeline Engineering Courses in Kerala | Blitz Academy.pdf
Piping and Pipeline Engineering Courses in Kerala | Blitz Academy.pdf
 
Cyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz AcademyCyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz Academy
 
Cyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz AcademyCyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz Academy
 
Cyber security course in Kerala, Kochi
Cyber  security  course in Kerala, KochiCyber  security  course in Kerala, Kochi
Cyber security course in Kerala, Kochi
 

Recently uploaded

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Recently uploaded (20)

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

Cyber security course in Kerala , Kochi

  • 1. CERTIFIED NETWORK DEFENDER Protect. Detect. Respond. Predict. Certified Network Defender CND TM CERTIFIED NETWORK DEFENDER 01
  • 2. Certified Network Defender v2 The only true blue teem network defense progrem! Cybersecurity now dominates the priorities of every enterprise striving to adapt to a post-COVID world. Forced to go remote, their workers’ identities and devices are the new security perimeter. In fact, cybersecurity for business is now as critical as internet access itself. The only progrem built for the world's lergest work−from−home experiment! Studies and news reports had demonstrated that cyber attackers are quick to attack the new, unprotected threat surfaces created when millions of employees started working from home. Providing network security to such an unprecedented, distributed ecosystem in this post- pandemic world is every Network Defense Team’s acid test. The Certified Network Defender v2 program has been upgraded and loaded with battle-ready ammunition to help Blue Teams defend and win the war against network breaches. Individuals and corporations looking to strengthen their Network Defense Skills will find CND v2 a must-have for 5 reasons: Only comprehensive network defense progrem built to incorporete criticel secure network skills−Protect, Detect,Respond end Predict Meps to NICE2.0Fremework Comes pecked withthe letesttools,technologies,end techniques Deploys e hends−on epproech to leerning Designed with en enhenced focus on Threet Prediction, Business Continuity end Disester Recovery CERTIFIED NETWORK DEFENDER 02
  • 3. An Adeptive Security Stretegy —Protect, Detect, Respond, end Predict Cybersecurity is a continuous, non-linear process. Therefore, your approach to mitigating cyber risks cannot be static. This is particularly important when the new “normal” has millions of employees working from remote locations on fragile, home-based WiFi networks and non- sanitized personal devices. According to Gartner, traditional “prevent and detect” approaches are inadequate. Opportunistic by nature, malicious actors look for the easiest ways to attack the most users and siphon off the maximum gains. Developing a continuous Adaptive Security Cycle helps organizations stay ahead of cybercriminals by creating and improving security systems. Enter CND v2. Protect Respond Detect Predict • Defense-In-Depth Security • Properly Designed, Implemented, and Enforced Security Policies • Security Architectures • Appropriate Configuration • Right Selection of Security Controls • Incident Response • Forensics Investigation • Business Continuity (BC) • Disaster Recovery (DR) • Traffic Monitoring • Log Management • Log Monitoring • Anomalies Detection • Risk and Vulnerability Assessment • Attack Surface Analysis • Threat Intelligence CERTIFIED NETWORK DEFENDER 03
  • 4. AsHends−OnesNetworkDefenseCen Get Creeted besed on e thorough job tesk enelysis CND v2 is based on the cybersecurity education framework and work role task analysis presented by the National Infocomm Competency Framework (NICF). The program is also mapped to the Department of Defense (DoD) roles for system/network administrators as well as global work roles and responsibilities laid out by the revised NICE Framework 2.0 Adeptive Security Stretegy CND v2 includes the Adaptive Security Strategy, thereby increasing the scope from Protect – Detect – Respond to Protect – Detect – Respond – Predict. Increesed Leb Time end Hends−On Focus More than 50% of the CND v2 program is dedicated to practical skills in live ranges via EC-Council labs covering domains like Network Defense Management, Network Perimeter Protection, Endpoint Protection, Application and Data Protection, Enterprise Virtual, Cloud, and Wireless Network Protection, Incident Detection and Response, and Threat Prediction. A Dediceted Module on IoTSecurity IoT security, previously ignored, is now an issue of great concern. IoT devices are not primarily designed with security in mind. This leaves serious vulnerabilities while configuring IoT devices in a network. CND v2 introduces candidates to the various challenges that IoT devices pose and the measures required to mitigate them. Network Virtuelizetion Prectices for the Remote Workforce Tracking security applications and configurations of remote work environments as workforce span across servers is very difficult. The CND v2 program teaches candidates to implement and manage the security of virtualization technologies Network Virtualization (NV), Software-Defined Network (SDN), Network Function Virtualization (NFV), OS Virtualization, Containers, Dockers, Kubernetes used in modern-day networks. CERTIFIED NETWORK DEFENDER 04
  • 5. An Upgrede on Mobile Security Meesures Research firm Gartner predicts that by 2021, 27% of corporate data traffic will bypass perimeter security and flow directly from mobile and portable devices to the cloud. With the CND v2, you will learn Enterprise Mobile Device Security, Redefine Access Control Security, and other platforms to ensure that this endpoint remains secure. Enhenced Focus on Cloud Security While the adoption of cloud computing in organizations has increased, so have the challenges. Candidates will learn different ways to ensure security across various cloud platforms - AWS, Microsoft Azure Cloud, and Google Cloud Platform. An Introduction to Threet Intelligence Having a proactive approach to security is the new requirement of all organizations. Without threat intelligence, your cybersecurity posture is only reactive. CND v2 helps you take a more effective, proactive approach using threat intelligence. In−DepthAtteck Surfece Anelysis The key to cyber risk management is in-depth attack surface analysis. CND v2 trains you to identify what parts of your organization need to be reviewed and tested for security vulnerabilities, and how to reduce, prevent, and mitigate network risks. Includes the Letest Technology CND v2 covers the latest technologies such as Software Defined Network (SDN) security, Network Function Virtualization (NFV) security, container security, docker security, and Kubernetes security. CERTIFIED NETWORK DEFENDER 05
  • 6. About the Exem CERTIFIED NETWORK DEFENDER 06 Number of Questions: 100 Test Delivery: ECCEXAM Exam Prefix: 312−38(ECCEXAMʜ Test Duration: 4 Hours Test Format: Multiple Choice Pessing score In order to maintain the high integrity of our certification exams, EC-Council Exams are provided in multiple forms (i.e., different question banks). Each form is carefully analyzed through beta testing with an appropriate sample group under the guidance of a committee of subject matter experts. This approach ensures our exams offer academic difficulty, as well as “real world” applications. We also have a process to determine the difficulty rating of each question. The individual rating then contributes to an overall “Cut Score” for each exam form. To ensure each form adheres to assessment standards, Cut Scores are set on a “per exam form” basis. Depending on which exam form is challenged, Cut Scores can range from 60% to 85%
  • 7. Course Outline CERTIFIED NETWORK DEFENDER 07 Module 01 Network Attacks and Defense Strategies Module 02 Administrative Network Security Module 03 Technical Network Security Module 04 Network Perimeter Security Module 05 Endpoint Security-Windows Systems Module 06 Endpoint Security-Linux Systems Module 07 Endpoint Security- Mobile Devices Module 08 Endpoint Security-IoT Devices Module 09 Administrative Application Security Module 10 Data Security Module 1 1 Enterprise Virtual Network Security Module 12 Enterprise Cloud Network Security Module 13 Enterprise Wireless Network Security Module 14 Network Traffic Monitoring and Analysis Module 15 Network Logs Monitoring and Analysis Module 16 Incident Response and Forensic Investigation Module 1 7 Business Continuity and Disaster Recovery Module 18 Risk Anticipation with Risk Management Module 19 Threat Assessment with Attack Surface Analysis Module 20 Threat Prediction with Cyber Threat Intelligence
  • 8. Whet will you leern? Understanding network security management Learn basics of first response and forensics Building threat intelligence capabilities Establishing and monitoring log management Implementing endpoint security Configuring optimum firewall solutions Understanding and using IDS/IPS technologies Establishing Network Authentication, Authorization, Accounting (AAA) Understanding indicators of Compromise, Attack, and Exposures (IoC, IoA, IoE) Establishing network security policies and procedures Windows and Linux security administration Embedding virtualization technology security Determining cloud and wireless security Deploying and using risk assessment tools Setting up mobile and IoT device security Implementing data security techniques on networks CERTIFIED NETWORK DEFENDER 08
  • 9. Who isit for? CND v2 is for those who work in the network administration/cybersecurity domain in the capacity of Network Administrator/Engineer, Network Security Administrator/Engineer/Analyst, Cybersecurity Engineer, Security Analyst, Network Defense Technician, Security Operator. CND v2 is for all cybersecurity operations, roles, and anyone looking to build a career in cybersecurity. Suggested Duretion: 5 Deys (9:00 AM —5:00 P M ʜ Eligibility Criterie To be eligible to challenge the EC-Council CND certification examination, the candidate has two options: Attend Officiel Network Security Treining by EC−Council: If a candidate has completed an official EC-Council training either at an Accredited Training Center, via the iClass platform, or at an approved academic institution, the candidate is eligible to challenge the relevant EC-Council exam without going through the application process. Attempt the Exem without Officiel EC−Council Treining: In order to be considered for the EC-Council CND v2 exam without attending official network security training, the candidate must have at least 2 years of work experience in the Information Security domain. If the candidate has the required work experience, they can submit an eligibility application form along with USD 100.00, a non-refundable fee. CERTIFIED NETWORK DEFENDER 09
  • 10. Treining options iLeern (Self−Studyʜ This solution is a self-directed study environment to deliver EC-Council's CND v2 program in a streaming video format. CERTIFIED NETWORK DEFENDER 10 iWeek (LiveOnlineʜ This solution provides live, online, instructor-led CND v2 training. You can attend it from anywhere as long as you have an internet connection. Mestercless This solution offers you the opportunity to learn Certified Network Defender from the world-class instructors in collaboration with top information security professionals. Treining Pertner (Instructor−led Treiningʜ CND v2 is available globally through EC-Council's Authorized Training Partners and are conveniently located in your area and offers you the benefit of learning through experienced certified EC-Council instructors along with your peers, gaining the real-world skills together. Educetion Pertner (In−Person or Onlineʜ This solution offers CND v2 through EC-Council Academia Partner institutions and is for students enrolled in the applicable college or university degree programs.
  • 11. Accreditetions, Recognitions, end Endorsements American National Standards Institute (ANSI) Government Communications Headquarters (GCHQ) United States Department of Defense (DoD) National Infocomm Competency Framework (NICF) CERTIFIED NETWORK DEFENDER 11
  • 12. Testimoniels EC-Council offers thorough programs with elaborate training content. My learning from the CertiЁed Network Defender (C/ND) program helped me in my professional life. With this obtained knowledge, I was able to analyze the vulnerabilities in our organization’s network security. I also contributed my inputs to strengthen the existing security infrastructure at my workplace. - Raymond Philip Gamboa Assistant Manager - Service Operations, Daimler Mobility AG, Singapore CERTIFIED NETWORK DEFENDER 12 For me, EC-Council’s CertiЁed Network Defender (C/ND) program covered the whole network security domain. It is a vendor-neutral, comprehensive program focusing network protocols, controls, vulnerabilities, devices, and much more. The program includes hands-on labs to offer a better understanding of all the major network security tools and techniques. - George L. S. Endpoint Protection/ACAS Administrator, Jacobs, USA For all those, who are passionate to learn network security, your Ёrst stop should be EC-Council CertiЁed Network Defender (C/ND). The C/ND courseware helped me understand the different modules in the program. Plus, there is no other training program that can cover this domain with such information. I wouldn’t have been able to attain the C/NDcredential without going through this advanced training. My experience involves high-quality labs, brilliant content delivery by an experienced instructor, and encyclopedic knowledge of the domain. It also covered various important networking topics which made this entire learning experience very relatable to real-world scenarios. After this, I am planning on progressing further through the path of credentials. - Geoffrey Chisnall Network Security Administrator, Experian, South Africa
  • 13. My experience with EC-Council beginning from the Ёrst training in 20l5, until now has been an excellent opportunity. The courseware and the training material, when compared to other vendor training courses, are much better, improving over the years with every new version update and credential release. - Ivica Gjorgjevski Head of Department for Security Accreditation of ClassiЁed information and ICT support, Directorate for Security of ClassiЁed Information, North Macedonia CERTIFIED NETWORK DEFENDER 13 After Ёnishing my contract with the Army, New Horizons Computer Learning Centers offered me career training in Cybersecurity. I wanted to take up EC- Council‘s CertiЁed Network Defender (C/ND) because of its massive amount of training material. Iwas thrilled to be able to learn and test my abilities in different network security concepts. Ifound its source material well written and full of new information. The C/ND training reminded me always to stay vigilant. Never stop learning because there’s always something new out there to discover. Kenneth P. Researcher IEEE, Spain
  • 14. EC-Council w w w . e c co u nc il. or g