
Certified Network Defender – v3 (CND)
Duration: 5 Days
Explore cloud and wireless attack techniques
Apply hacking methodologies and frameworks
Learn security goals, challenges, and layered defense strategies
Compliance with laws and standards
Design security policies
Implement awareness training and other administrative controls
Access control models and IAM
Cryptographic security techniques
Network segmentation, security solutions, and protocols
Firewall topologies and configurations
IDS/IPS types, deployment, tuning
Router/switch security and software-defined perimeter
Security components and hardening techniques
Patch management and account/password policies
Active Directory and network services security
Linux hardening, patching, and password management
Remote access and security tools
Enterprise mobile policies
Security tools for Android and iOS
IoT ecosystem and communication models
Security risks, tools, standards, and best practices
Sandboxing
Patch management
Web Application Firewall (WAF)
Access controls
Encryption at rest and in transit
Masking, backup, retention, and DLP
Network and OS virtualization security
Security for containers, Docker, Kubernetes
Cloud fundamentals and insights
Security in AWS, Azure, GCP
Best practices and tools
Encryption mechanisms and authentication
Implementation of wireless security controls
Set up monitoring environments
Use Wireshark
Baseline normal vs. suspicious traffic
Monitor logs on Windows, Linux, Mac
Firewall, router, web server logs
Centralized log monitoring
First responder roles
Incident handling processes
Forensic methodology
BC/DR concepts and activities
BCP/DRP planning
Standards and compliance
Risk management frameworks
Vulnerability management and scanning
IoE, attack simulation, cloud/IoT surfaces
Attack surface visualization and reduction
Indicators of Compromise (IoC) and Attack (IoA)