Certified Network Defender – v3 (CND) cover image

Certified Network Defender – v3 (CND)

Duration: 5 Days

The Certified Network Defender (CNDv3) course by EC-Council equips professionals with skills to defend, detect, and respond to network attacks. It covers protection of perimeter, endpoints, mobile, IoT, and cloud systems, along with network traffic/log monitoring, incident response, disaster recovery, and threat intelligence.
Module 1: Network Attacks and Defense Strategies

Explore cloud and wireless attack techniques

Apply hacking methodologies and frameworks

Learn security goals, challenges, and layered defense strategies

Module 2: Administrative Network Security

Compliance with laws and standards

Design security policies

Implement awareness training and other administrative controls

Module 3: Technical Network Security

Access control models and IAM

Cryptographic security techniques

Network segmentation, security solutions, and protocols

Module 4: Network Perimeter Security

Firewall topologies and configurations

IDS/IPS types, deployment, tuning

Router/switch security and software-defined perimeter

Module 5: Endpoint Security – Windows Systems

Security components and hardening techniques

Patch management and account/password policies

Active Directory and network services security

Module 6: Endpoint Security – Linux Systems

Linux hardening, patching, and password management

Remote access and security tools

Module 7: Endpoint Security – Mobile Devices

Enterprise mobile policies

Security tools for Android and iOS

Module 8: Endpoint Security – IoT Devices

IoT ecosystem and communication models

Security risks, tools, standards, and best practices

Module 9: Administrative Application Security

Sandboxing

Patch management

Web Application Firewall (WAF)

Module 10: Data Security

Access controls

Encryption at rest and in transit

Masking, backup, retention, and DLP

Module 11: Enterprise Virtual Network Security

Network and OS virtualization security

Security for containers, Docker, Kubernetes

Module 12: Enterprise Cloud Security

Cloud fundamentals and insights

Security in AWS, Azure, GCP

Best practices and tools

Module 13: Wireless Network Security

Encryption mechanisms and authentication

Implementation of wireless security controls

Module 14: Network Traffic Monitoring and Analysis

Set up monitoring environments

Use Wireshark

Baseline normal vs. suspicious traffic

Module 15: Network Logs Monitoring and Analysis

Monitor logs on Windows, Linux, Mac

Firewall, router, web server logs

Centralized log monitoring

Module 16: Incident Response and Forensic Investigation

First responder roles

Incident handling processes

Forensic methodology

Module 17: Business Continuity and Disaster Recovery

BC/DR concepts and activities

BCP/DRP planning

Standards and compliance

Module 18: Risk Anticipation with Risk Management

Risk management frameworks

Vulnerability management and scanning

Module 19: Threat Assessment with Attack Surface Analysis

IoE, attack simulation, cloud/IoT surfaces

Attack surface visualization and reduction

Indicators of Compromise (IoC) and Attack (IoA)