Certified Network Defender

///Certified Network Defender

Certified Network Defender

Course ID: CND 5 Days Singapore

Certified Network Defender

No Schedule


Students enrolled in the Certified Network Defender course, will gain a detailed understanding and hands on ability to function in real life situations involving network defense. They will gain the technical depth required to actively design a secure network in your organization. This program will be akin to learning math instead of just using a calculator. This course gives you the fundamental understanding of the true construct of data transfer, network technologies, software technologies so that you understand how networks operate, understand what software is automating and how to analyze the subject material.

This product is currently out of stock and unavailable.



  • Network Administrators
  • Network security Administrators
  • Network Security Engineer
  • Network Defense Technicians
  • CND Analyst
  • Security Analyst
  • Security Operator
  • Anyone who involves in network operations


Certified Network Defense


  • CND certification (312-38)


Instructor-led / Virtual Instructor-led



  • Learn about various network security controls, protocols, and devices
  • Troubleshoot network for various network problems
  • Identify various threats on organization network
  • Design and implement various security policies for the organizations
  • Learn the importance of physical security and able to determine and implement various physical security controls for their organizations
  • Harden security of various hosts individually in the organization’s network
  • Choose appropriate firewall solution, topology, and configurations to harden security through firewall
  • Determine appropriate location for IDS/IPS sensors, tuning IDS for false positives and false negatives, and configurations to harden security through IDPS technologies
  • Implement secure VPN implementation for their organization
  • Identify various threats to wireless network and learn how to mitigate them
  • Monitor and conduct signature analysis to detect various types of attacks and policy violation activities
  • Perform risk assessment, vulnerability assessment/scanning through various scanning tools and generate detailed reports on it
  • Identify the critical data, choose appropriate back up method, media and technique to perform successful backup of organization data on regular basis
  • Provide first response to the network security incident and assist IRT team and forensics investigation team in dealing with an incident


Module 1: Computer Network and Defense Fundamentals

Module 2: Network Security Threats, Vulnerabilities, and Attacks

Module 3: Network Security Controls, Protocols, and Devices

Module 4: Network Security Policy Design and Implementation

Module 5: Physical Security

Module 6: Host Security

Module 7: Secure Firewall Configuration and Management

Module 8: Secure IDS Configuration and Management

Module 9: Secure VPN Configuration and Management

Module 10: Wireless Network Defense

Module 11: Network Traffic Monitoring and Analysis

Module 12: Network Risk and Vulnerability Management

Module 13: Data Backup and Recovery

Module 14: Network Incident Response and Management

What’s Next

Subscribe to our mailing list for special offers and promotions.

Thank you! Your subscription has been confirmed. You'll hear from us soon.