• 985-1165508
  • info@itsecuritynepal.com

Certified Network Defender (CND)

40 Hrs 2 Hrs per day 7 AM to 5 PM
Certified Network Defender (CND)

Organizational specialize in cyber defense is a lot of necessary than ever as cyber breaches have a so much larger money impact and might cause broad reputational injury. Network directors spends plenty of your time with network environments, and area unit accustomed to network elements, traffic, performance and utilization, configuration, location of every system, security policy, etc. So, organizations will be far better in defensive themselves from vicious attacks if the IT and network directors equipped with adequate network security skills .Thus Network administrator will play a major role in network defense and become 1st line of defense for any organizations.

There is no correct military science network security coaching that's created on the market for network directors that provides them core network security skills.Students registered within the Certified Network Defender course, can gain a close understanding and hands on ability to perform in world things involving network defense. they're going to gain the technical depth needed to actively style a secure network in your organization. This program are corresponding to learning maths rather than simply employing a calculator. This course provides you the basic understanding of actuality construct of knowledge transfer, network technologies, computer code technologies in order that you perceive however networks operate, perceive what computer code is automating and the way to research the topic material.

Course Objectives :

  • Computer Network and Defense Fundamentals.
  • Network Security Threats, Vulnerabilities, and Attacks.
  • Network Security Controls, Protocols, and Devices.
  • Network Security Policy Design and Implementation.
  • Physical Security.
  • Host Security.
  • Secure Firewall Configuration and Management.
  • Secure IDS Configuration and Management.
  • Secure VPN Configuration and Management.
  • Wireless Network Defense.
  • Network Traffic Monitoring and Analysis.
  • Network Risk and Vulnerability Management.
  • Data Backup and Recovery.
  • Network Incident Response and Management.

Module 01: Computer Network and Defense Fundamentals

Network Fundamentals

Network Components

TCP/IP Networking Basics

TCP/IP Protocol Stack

IP Addressing

Computer Network Defense (CND)

CND Triad

CND Process

CND Actions

CND Approaches

Module 02: Network Security Threats, Vulnerabilities, and Attacks

Essential Terminologies

Network Security Concerns

Network Security Vulnerabilities

Network Reconnaissance Attacks

Network Access Attacks

Denial of Service (DoS) Attacks

Distributed Denial-of-Service Attack (DDoS)

Malware Attacks

Module 03: Network Security Controls, Protocols, and Devices

Fundamental Elements of Network Security

Network Security Controls

User Identification, Authentication, Authorization and Accounting

Types of Authorization Systems

Authorization Principles


Security Policy

Network Security Devices

Network Security Protocols

Module 04: Network Security Policy Design and Implementation

What is Security Policy?

Internet Access Policies

Acceptable-Use Policy

User-Account Policy

Remote-Access Policy

Information-Protection Policy

Firewall-Management Policy

Special-Access Policy

Network-Connection Policy

Business-Partner Policy

Email Security Policy

Passwords Policy

Physical Security Policy

Information System Security Policy

Bring Your Own Devices (BYOD) Policy

Software/Application Security Policy

Data Backup Policy

Confidential Data Policy

Data Classification Policy

Internet Usage Policies

Server Policy

Wireless Network Policy

Incidence Response Plan (IRP)

User Access Control Policy

Switch Security Policy

Intrusion Detection and Prevention (IDS/IPS) Policy

Personal Device Usage Policy

Encryption Policy

Router Policy

Security Policy Training and Awareness

ISO Information Security Standards

Payment Card Industry Data Security Standard (PCI-DSS)

Health Insurance Portability and Accountability Act (HIPAA)

Information Security Acts: Sarbanes Oxley Act (SOX)

Information Security Acts: Gramm-Leach-Bliley Act (GLBA)

Information Security Acts: The Digital Millennium Copyright Act (DMCA) and Federal

Information Security Management Act (FISMA)

Other Information Security Acts and Laws

Module 05: Physical Security

Physical Security

Access Control Authentication Techniques

Physical Security Controls

Other Physical Security Measures

Workplace Security

Personnel Security: Managing Staff Hiring and Leaving Process

Laptop Security Tool: EXO5

Environmental Controls

Physical Security: Awareness /Training

Physical Security Checklists

Module 06: Host Security

Host Security

OS Security

Linux Security

Securing Network Servers

Hardening Routers and Switches

Application/software Security

Data Security

Virtualization Security

Module 07: Secure Firewall Configuration and Management

Firewalls and Concerns

What Firewalls Does?

What should you not Ignore?: Firewall Limitations

How Does a Firewall Work?

Firewall Rules

Types of Firewalls

Firewall Technologies

Firewall Topologies

Firewall Rule Set & Policies

Firewall Implementation

Firewall Administration

Firewall Logging and Auditing

Firewall Anti-evasion Techniques

Why Firewalls are Bypassed?

Full Data Traffic Normalization

Data Stream-based Inspection

Vulnerability-based Detection and Blocking

Firewall Security Recommendations and Best Practices

Firewall Security Auditing Tools

Module 08: Secure IDS Configuration and Management

Intrusions and IDPS


Types of IDS Implementation

IDS Deployment Strategies

Types of IDS Alerts


IDPS Product Selection Considerations

IDS Counterparts

Module 09: Secure VPN Configuration and Management

Understanding Virtual Private Network (VPN)

How VPN works?

Why to Establish VPN ?

VPN Components

VPN Concentrators

Types of VPN

VPN Categories

Selecting Appropriate VPN

VPN Core Functions

VPN Technologies

VPN Topologies

Common VPN Flaws

VPN Security

Quality Of Service and Performance in VPNs

Module 10: Wireless Network Defense

Wireless Terminologies

Wireless Networks

Wireless Standard

Wireless Topologies

Typical Use of Wireless Networks

Components of Wireless Network

WEP (Wired Equivalent Privacy) Encryption

WPA (Wi-Fi Protected Access) Encryption

WPA2 Encryption

WEP vs. WPA vs. WPA2

Wi-Fi Authentication Method

Wi-Fi Authentication Process Using a Centralized Authentication Server

Wireless Network Threats

Bluetooth Threats

Wireless Network Security

Wi-Fi Discovery Tools

Locating Rogue Access points

Protecting from Denial-of-Service Attacks: Interference

Assessing Wireless Network Security

Wi-Fi Security Auditing Tool: AirMagnet WiFi Analyzer

WPA Security Assessment Tool

Wi-Fi Vulnerability Scanning Tools

Deploying Wireless IDS (WIDS) and Wireless IPS (WIPS)


Configuring Security on Wireless Routers

Additional Wireless Network Security Guidelines

Module 11: Network Traffic Monitoring and Analysis

Network Traffic Monitoring and Analysis(Introduction)

Network Monitoring: Positioning your Machine at Appropriate Location

Network Traffic Signatures

Packet Sniffer: Wireshark

Detecting OS Fingerprinting Attempts

Detecting PING Sweep Attempt

Detecting ARP Sweep/ ARP Scan Attempt

Detecting TCP Scan Attempt

Detecting SYN/FIN DDOS Attempt

Detecting UDP Scan Attempt

Detecting Password Cracking Attempts

Detecting FTP Password Cracking Attempts

Detecting Sniffing (MITM) Attempts

Detecting the Mac Flooding Attempt

Detecting the ARP Poisoning Attempt

Additional Packet Sniffing Tools

Network Monitoring and Analysis

Bandwidth Monitoring

Module 12: Network Risk and Vulnerability Management

What is Risk?

Risk Levels

Risk Matrix

Key Risk Indicators(KRI)

Risk Management Phase

Enterprise Network Risk Management

Vulnerability Management

Module 13: Data Backup and Recovery

Introduction to Data Backup

RAID (Redundant Array Of Independent Disks) Technology

Storage Area Network (SAN)

Network Attached Storage (NAS)

Selecting Appropriate Backup Method

Choosing the Right Location for Backup

Backup Types

Conducting Recovery Drill Test

Data Recovery

Windows Data Recovery Tool

RAID Data Recovery Services

SAN Data Recovery Software

NAS Data Recovery Services

Module 14: Network Incident Response and Management

Incident Handling and Response

Incident Response Team Members: Roles and Responsibilities

First Responder

Incident Handling and Response Process

Overview of IH&R Process Flow

You should be well-versed in cyber security fundamentals also as basic networking knoweldge like Comptia Network+ or CCNA level.

For any Query or Custom Plan


Head Office:
Phone No: +977-01-4469653
Mobile: +977- 9851165508
New Baneshwor-10 (Beside K&K College),
Chhakku Bakku Marg


Classroom Training

Classroom Training

1 on 1 Training

1 on 1 Training

Live Virtual Training

Live Virtual Training

Flip Class

Flip Class

Related Courses

Certified Ethical Hacking

Technology that changed everyone's mind and dragged them in IT industry is Hacking. To go it legally and become certified, CEH is the course designed by EC- council.