The Certified Network Defender (CNDv2) certification program focuses on training Network Administrators to protect, detect, respond to, and predict threats on the network. This builds upon the typical knowledge and skills of Network Administrators in network components, traffic, performance and utilization, network topology, system locations and security policies.
The only true blue team network defense program!
Cybersecurity now dominates the priorities of every enterprise striving to adapt to a post-COVID world. Forced to go remote, their workers’ identities and devices are the new security perimeter. In fact, cybersecurity for business is now as critical as internet access itself.
The only program built for the world’s largest work-from-home experiment!
Studies and news reports had demonstrated that cyber attackers are quick to attack the new, unprotected threat surfaces created when millions of employees started working from home. Providing network security to such an unprecedented, distributed ecosystem in this post- pandemic world is every Network Defense Team’s acid test.
Network Administrator, Network Engineer, Network Security Administrator/Engineer/Analyst, Cybersecurity Engineer, Security Analyst/Operator, Network Defense Technician
Minimum 40 hours
Exam title: Certified Network Defender
Number of questions: 100
Duration: 4 hours
• Core: CND
• Advanced: C|EH (Certified Ethical Hacker) (ANSI and Practical)
• Expert: CPENT, LPT (Master)
► Network Attacks and Defense Strategies
► Administrative Network Security
► Technical Network Security
► Network Perimeter Security
► Endpoint Security-Windows Systems
► Endpoint Security-Linux Systems
► Endpoint Security- Mobile Devices
► Endpoint Security-IoT Devices
► Administrative Application Security
► Data Security
► Enterprise Virtual Network Security
► Enterprise Cloud Network Security
► Enterprise Wireless Network Security
► Network Traffic Monitoring and Analysis
► Network Logs Monitoring and Analysis
► Incident Response and Forensic Investigation
► Business Continuity and Disaster Recovery
► Risk Anticipation with Risk Management
► Threat Assessment with Attack Surface Analysis
► Threat Prediction with Cyber Threat Intelligence