Course Overview

Course Curriculum

Course Content

  • CND

    Preview
    • Module 01: Computer Network and Defense Fundamentals

      • Network Fundamentals
      • Network Components
      • TCP/IP Networking Basics
      • TCP/IP Protocol Stack
      • IP Addressing
      • Computer Network Defense (CND)
      • CND Triad
      • CND Process
      • CND Actions
      • CND Approaches
    • Module 02: Network Security Threats, Vulnerabilities, and Attacks

      • Essential Terminologies
      • Network Security Concerns
      • Network Security Vulnerabilities
      • Network Reconnaissance Attacks
      • Network Access Attacks
      • Denial of Service (DoS) Attacks
      • Distributed Denial-of-Service Attack (DDoS)
      • Malware Attacks
    • Module 03: Network Security Controls, Protocols, and Devices

      • Fundamental Elements of Network Security
      • Network Security Controls
      • User Identification, Authentication, Authorization and Accounting
      • Types of Authorization Systems
      • Authorization Principles
      • Cryptography
      • Security Policy
      • Network Security Devices
      • Network Security Protocols
    • Module 04: Network Security Policy Design and Implementation

      • What is Security Policy?
      • Internet Access Policies
      • Acceptable-Use Policy
      • User-Account Policy
      • Remote-Access Policy
      • Information-Protection Policy
      • Firewall-Management Policy
      • Special-Access Policy
      • Network-Connection Policy
      • Business-Partner Policy
      • Email Security Policy
      • Passwords Policy
      • Physical Security Policy
      • Information System Security Policy
      • Bring Your Own Devices (BYOD) Policy
      • Software/Application Security Policy
      • Data Backup Policy
      • Confidential Data Policy
      • Data Classification Policy
      • Internet Usage Policies
      • Server Policy
      • Wireless Network Policy
      • Incidence Response Plan (IRP)
      • User Access Control Policy
      • Switch Security Policy
      • Intrusion Detection and Prevention (IDS/IPS) Policy
      • Personal Device Usage Policy
      • Encryption Policy
      • Router Policy
      • Security Policy Training and Awareness
      • ISO Information Security Standards
      • Payment Card Industry Data Security Standard (PCI-DSS)
      • Health Insurance Portability and Accountability Act (HIPAA)
      • Information Security Acts: Sarbanes Oxley Act (SOX)
      • Information Security Acts: Gramm-Leach-Bliley Act (GLBA)
      • Information Security Acts: The Digital Millennium Copyright Act (DMCA) and Federal Information Security Management Act (FISMA)
      • Other Information Security Acts and Laws
    • Module 05: Physical Security

      • Physical Security
      • Access Control Authentication Techniques
      • Physical Security Controls
      • Other Physical Security Measures
      • Workplace Security
      • Personnel Security: Managing Staff Hiring and Leaving Process
      • Laptop Security Tool: EXO5
      • Environmental Controls
      • Physical Security: Awareness /Training
      • Physical Security Checklists
    • Module 06: Host Security

      • Host Security
      • OS Security
      • Linux Security
      • Securing Network Servers
      • Hardening Routers and Switches
      • Application/software Security
      • Data Security
      • Virtualization Security
    • Module 07: Secure Firewall Configuration and Management

      • Firewalls and Concerns
      • What Firewalls Does?
      • What should you not Ignore?: Firewall Limitations
      • How Does a Firewall Work?
      • Firewall Rules
      • Types of Firewalls
      • Firewall Technologies
      • Firewall Topologies
      • Firewall Rule Set & Policies
      • Firewall Implementation
      • Firewall Administration
      • Firewall Logging and Auditing
      • Firewall Anti-evasion Techniques
      • Why Firewalls are Bypassed?
      • Full Data Traffic Normalization
      • Data Stream-based Inspection
      • Vulnerability-based Detection and Blocking
      • Firewall Security Recommendations and Best Practices
      • Firewall Security Auditing Tools
    • Module 08: Secure IDS Configuration and Management

      • Intrusions and IDPS
      • IDS
      • Types of IDS Implementation
      • IDS Deployment Strategies
      • Types of IDS Alerts
      • IPS
      • IDPS Product Selection Considerations
      • IDS Counterparts
    • Module 09: Secure VPN Configuration and Management

      • Understanding Virtual Private Network (VPN)
      • How VPN works?
      • Why to Establish VPN ?
      • VPN Components
      • VPN Concentrators
      • Types of VPN
      • VPN Categories
      • Selecting Appropriate VPN
      • VPN Core Functions
      • VPN Technologies
      • VPN Topologies
      • Common VPN Flaws
      • VPN Security
      • Quality Of Service and Performance in VPNs
    • Module 10: Wireless Network Defense

      • Wireless Terminologies
      • Wireless Networks
      • Wireless Standard
      • Wireless Topologies
      • Typical Use of Wireless Networks
      • Components of Wireless Network
      • WEP (Wired Equivalent Privacy) Encryption
      • WPA (Wi-Fi Protected Access) Encryption
      • WPA2 Encryption
      • WEP vs. WPA vs. WPA2
      • Wi-Fi Authentication Method
      • Wi-Fi Authentication Process Using a Centralized Authentication Server
      • Wireless Network Threats
      • Bluetooth Threats
      • Wireless Network Security
      • Wi-Fi Discovery Tools
      • Locating Rogue Access points
      • Protecting from Denial-of-Service Attacks: Interference
      • Assessing Wireless Network Security
      • Wi-Fi Security Auditing Tool: AirMagnet WiFi Analyzer
      • WPA Security Assessment Tool
      • Wi-Fi Vulnerability Scanning Tools
      • Deploying Wireless IDS (WIDS) and Wireless IPS (WIPS)
      • WIPS Tool
      • Configuring Security on Wireless Routers
      • Additional Wireless Network Security Guidelines
    • Module 11: Network Traffic Monitoring and Analysis

      • Network Traffic Monitoring and Analysis(Introduction)
      • Network Monitoring: Positioning your Machine at Appropriate Location
      • Network Traffic Signatures
      • Packet Sniffer: Wireshark
      • Detecting OS Fingerprinting Attempts
      • Detecting PING Sweep Attempt
      • Detecting ARP Sweep/ ARP Scan Attempt
      • Detecting TCP Scan Attempt
      • Detecting SYN/FIN DDOS Attempt
      • Detecting UDP Scan Attempt
      • Detecting Password Cracking Attempts
      • Detecting FTP Password Cracking Attempts
      • Detecting Sniffing (MITM) Attempts
      • Detecting the Mac Flooding Attempt
      • Detecting the ARP Poisoning Attempt
      • Additional Packet Sniffing Tools
      • Network Monitoring and Analysis
      • Bandwidth Monitoring
    • Module 12: Network Risk and Vulnerability Management

      • What is Risk?
      • Risk Levels
      • Risk Matrix
      • Key Risk Indicators(KRI)
      • Risk Management Phase
      • Enterprise Network Risk Management
      • Vulnerability Management
    • Module 13: Data Backup and Recovery

      • Introduction to Data Backup
      • RAID (Redundant Array Of Independent Disks) Technology
      • Storage Area Network (SAN)
      • Network Attached Storage (NAS)
      • Selecting Appropriate Backup Method
      • Choosing the Right Location for Backup
      • Backup Types
      • Conducting Recovery Drill Test
      • Data Recovery
      • Windows Data Recovery Tool
      • RAID Data Recovery Services
      • SAN Data Recovery Software
      • NAS Data Recovery Services
    • Module 14: Network Incident Response and Management

      • Incident Handling and Response
      • Incident Response Team Members: Roles and Responsibilities
      • First Responder
      • Incident Handling and Response Process
      • Overview of IH&R Process Flow

Why Join this Program

  • Develop skills for real career growthCutting-edge curriculum designed in guidance with industry and academia to develop job-ready skills
  • Learn from experts active in their field, not out-of-touch trainersLeading practitioners who bring current best practices and case studies to sessions that fit into your work schedule.
  • Learn by working on real-world problemsCapstone projects involving real world data sets with virtual labs for hands-on learning
  • Structured guidance ensuring learning never stops24x7 Learning support from mentors and a community of like-minded peers to resolve any conceptual doubts
  • Acknowledgement
  • PMP, PMI, PMBOK, CAPM, PgMP, PfMP, ACP, PBA, RMP, SP, OPM3 and the PMI ATP seal are the registered marks of the Project Management Institute, Inc.