EC-Council Certified Network Defender (CND) - Slechts 4 dagen

Zeven redenen waarom jij voor jouw CND cursus voor Firebrand kiest:

Bekijk deze video en zie waarom je met Firebrand geld en tijd bespaart

  1. Jij zal in slechts 4 dagen CND getrained zijn. Doordat onze cursussen residentieel zijn kunnen wij langere lesdagen aanbieden en zal je tijdens je verblijf volledig gefocust zijn op jouw cursus
  2. Onze CND cursus is all-inclusive. Cursusmaterialen, accommodatie en maaltijden zijn inbegrepen.
  3. Slaag de eerste keer voor CND of train gratis opnieuw. Vraag naar de voorwaarden van onze certificeringsgarantie bij onze Education Consultants.
  4. Je zal meer over CND leren. Waar opleidingen elders doorgaans van 9:00 tot 17:00 duren, kan je bij Firebrand Training rekenen op 12 uur training per dag!

  5. Je zal CND sneller beheersen. Doordat onze cursussen residentieel zijn word je in korte tijd ondergedompeld in de theorie. Hierdoor zal je volledig gefocust zijn op de cursus en zal je sneller de theorie en praktijk beheersen.
  6. Je zal voor CND studeren bij de beste training provider. Firebrand heeft het Q-For kwaliteitlabel, waarmee onze standaarden en professionaliteit op het gebied van training erkend worden. We hebben inmiddels 62.840 professionals getraind en gecertificeerd!
  7. Je gaat meer doen dan alleen de cursusstof van CND bestuderen. We maken gebruik van laboratoria, case-studies en oefentests, om ervoor te zorgen dat jij jouw nieuwe kennis direct in jouw werkomgeving kan toepassen.

Denk jij klaar te zijn voor deze opleiding? Doe een GRATIS oefentest om je kennis te testen!

Wanneer wilt u deelnemen aan een versnelde opleiding?

Start datum

Eind datum

Status

Nu boeken

Beëindigde cursus

 

Open

Nu boeken

Open

Nu boeken

Open

Nu boeken

Wereldwijd heeft Firebrand in haar 10-jarig bestaan al 62.840 studenten opgeleid! We hebben ze allemaal gevraagd onze versnelde opleidingen te evalueren. De laatste keer dat we onze resultaten analyseerden, bleek 96.45% ons te beoordelen als ‘boven verwachting’

"The training was very comprehensive and covered a wide range of CEH topics. The instructor was very knowledgeable and able to relate the material in a way which was understandable. Overall great course!"
Anoniem - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (1/2/2016 t/m 5/2/2016)

"The amount of knowledge the trainer brought to us in one week was simply amazing. At times I did not get where his energy kept coming from. I dont think you can ask for much more. Well done! I learned a lot, and I learned a new way of thinking!!"
Anoniem - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (25/1/2016 t/m 29/1/2016)

"Cursus geeft een zeer goed overzicht van wat er mogelijk is op het gebied van Hacking."
Anoniem - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (25/1/2016 t/m 29/1/2016)

"De instructeur had veel praktische ervaring dat zeker een meerwaarde geeft aan de cursus. Ga zo verder!"
Anoniem - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (25/1/2016 t/m 29/1/2016)

"Goede intensieve cursus met veel bruikbaar naslagwerk, gegeven door een zeer ervaren lesgever! Goede faciliteiten."
Anoniem - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (25/1/2016 t/m 29/1/2016)

"Deze dagen heb ik geleerd dat er veel mogelijkheden zijn om te hacken. De bewustwording alleen al helpt ons al om beter te beschermen."
Anoniem - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (25/1/2016 t/m 29/1/2016)

"The trainer gave me an excellent hand-on approach of teaching me the fundamental concepts of Ethical Hacking. He supplied me with wonderful tools, explanations and real life scenarios. He was making sure you'd understand the concepts he was teaching. The teacher prepared me in the best conceivable way he could, while I did whatever I could. I felt confident taking the CEH test. Having a full on knowledge about the concepts of hacking."
Jan Harm Broekman, Sint Antonius Ziekenhuis. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (14/12/2015 t/m 18/12/2015)

"Het is een zeer goede training. Er is volledige toegang tot het klaslokaal. De cursus is wel zwaar, maar het is zeker te doen. Ook kun je het examen uitstellen zonder probleem. Doordat de cursus op zo'n korte tijd gegeven wordt verlies je heel weinig tijd."
B.C., All Buro Solutions. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (14/12/2015 t/m 18/12/2015)

"Dit is de ideale manier om in een korte tijd skills op te bouwen"
Rudy Truyens. - EC-Council ECSA Certificering (5 Dagen) (26/10/2015 t/m 30/10/2015)

"Take a Firebrand course, you wont regret it!"
Anoniem - EC-Council ECSA Certificering (5 Dagen) (1/9/2014 t/m 5/9/2014)

" Een week bikkelen in hoog tempo met een docent die passie heeft voor het vak zorgen er voor dat je snel inzichten krijgt wat er nu wel en niet veilig is. De technieken die je je eigen maakt tijdens deze training zijn direct in de praktijk toepasbaar en zorgen er voor dat je maatregelen kunt gaan nemen. Een perfecte cursuslokatie gecombineerd met een groep enthousiaste mensen zorgen voor heldere en levendige discussies waardoor je nog meer wilt weten over hoe je de beveiliging kunt testen en tegenmaatregelen kunt nemen. Een kleine waarschuiwing is wel op zijn plek, na het volgen van de CEH zie je alles door andere ogen en met tijden vetrouw je niets of niemand meer!"
Wim Daans, RD Services. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (17/3/2014 t/m 21/3/2014)

"Prima cursus, snel en erg goed!"
Raymond vanderAa. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (17/3/2014 t/m 21/3/2014)

"Great teacher, perfect location. Learned a lot with high speed, it is really a challange. You will need to be well prepared and gain experience before attending."
Marco Tilburg, Query ITechnologies. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (17/3/2014 t/m 21/3/2014)

"Effectief snel leren, met de nodige humor."
Raymond van der Aa. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (6/1/2014 t/m 10/1/2014)

"Je bent 5 dagen lang alleen bezig met CEH. Geen afleiding door ander zaken."
Anoniem - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (6/1/2014 t/m 10/1/2014)

"De instructeur weet je 5 dagen te boeien door de manier waarop hij de complete CEH materie behandeld. Geen powerpoint slides maar een verhaal met praktijkvoorbeelden en nuttige tips. Wanneer je later de materie bestudeert, blijkt dat de instructeur het heeft behandeld."
Anoniem - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (6/1/2014 t/m 10/1/2014)

"Zeer kundige docenten, mensen die uit het veld komen en weten waar ze over spreken. "
Anoniem, ministerie van Binnenlandse zaken - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (11/11/2013 t/m 15/11/2013)

"In slechts 5 dagen krijg je alle relevante kennis aangedragen die je nodig hebt voor je certificering. 5 dagen bikkelen heeft zeker resultaat."
Gerwin Aalderink, Rabobank. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (11/11/2013 t/m 15/11/2013)

"Fast-paced super focused training is what you really need to quickly gain new skills, or improve on your current skills. Obviously, the quality of the teacher is also imperative and I found the instructor to be an exceptional eacher who manages to cover a lot of material whilst at the same time spicing it up with humor and real-life stories out of his vast professional experience. This really helps to make it stick. I also must mention the fact that the venue is excellent, with very friendly staff and excellent food, even if you have a food allergy or intolerance"
Anoniem, ORBATEC - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (11/11/2013 t/m 15/11/2013)

"Intensieve training van ervaren docent. Veel kennisoverdracht in korte periode. "
Jan Ysebaert, all-project BVBA. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (9/9/2013 t/m 13/9/2013)

"Very nice training and had a very nice week, thank you Firebrand!!"
Anoniem - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (9/9/2013 t/m 13/9/2013)

"The course is very insightful,but at the same time very fun. Although you need some knowledge before hand, to help you along your journey to be certified ethical hacker."
Anoniem - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (9/9/2013 t/m 13/9/2013)

"The logistics, service, accommodation, course material; everything is well organised and complete. Really nice place (in Guldenberg), nice quiet surroundings; Firebrand has chosen a good location for their course. The course itself was fast paced and attention grabbing and gripping (CEH). Entertaining Instructor."
Anoniem - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (8/7/2013 t/m 12/7/2013)

"The CEH course provided an excellent insight and the course delivery ensured the more in depth topics were presented in a easy to understand way."
Anoniem - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (13/5/2013 t/m 17/5/2013)

"Zeer leerzaam, veel inhoud en handson. Een leraar die vanuit de praktijk en ervaring spreekt. Wel hele lange dagen."
PB, Gemeente Maastricht. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (6/2/2012 t/m 10/2/2012)

"Een cursus met veel praktijk. De docent weet de materie goed over te brengen en geeft voorbeelden uit de praktijk. "
Marco Hermans, Gemeente Maastricht. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (6/2/2012 t/m 10/2/2012)

"Geweldig, praktijk gerichte opleiding met een zeer ervaren docent. Zeker aan te bevelen voor de techneuten tussen ons."
Anoniem - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (6/2/2012 t/m 10/2/2012)

"Zeer gedreven instructeur met gedegen ervaring uit de praktijk. "
Bert-Jan van der Burg, Van Houtum BV. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (6/2/2012 t/m 10/2/2012)

"The instructor was very knowledgable, and I would participate another course with him as the instructor. I am likely to attend the follow up course in the UK in April 2016. "
R.S., CACI . - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (14/12/2015 t/m 18/12/2015)

"The teacher is a really good guy, he has a really good way of teaching the course. He explains it with examples etc. The overall impression of the lecture is really good. It also opened my eyes in security and I'm planning to do the next ec-council and hope this same instructor will do the course, he did a really good job. "
B.C., All Buro Solutions. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (14/12/2015 t/m 18/12/2015)

"Extreme focus, very experienced trainer, great exam preparation, sure to pass"
Anoniem - EC-Council Computer Hacking Forensics Investigator (CHFI v9) (5 Dagen) (30/11/2015 t/m 4/12/2015)

"I really enjoy the Firebrand training format. The trainer was passionate and knowledgeable about the material he was teaching."
Arjen Post. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (8/7/2013 t/m 12/7/2013)

"The CEHv8 Firebrand Training was very, very good. Five days non-stop training by an excellent teacher with loads of experience."
Robert Jan van der Burght, Kadaster. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (8/7/2013 t/m 12/7/2013)

"If you want to test your IT and TI skills for becoming a security specialist this is the way to start. Be prepared to get on a technical challenging rollercoaster and get inspired with new ideas."
Ronald van Dorp, KPN. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (15/10/2012 t/m 19/10/2012)

"The CEHv7 training was lot of fun! Nice hacking and lost of study materials I like it this way!!"
Maurice Janmaat, Ordina. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (15/10/2012 t/m 19/10/2012)

"Fine, quick and accurate instructor with very up to date knowledge. Training facilities are fine: small room, good food, nice surroundings."
N.B. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (8/10/2012 t/m 12/10/2012)

"Hard work, long hours, but interesting and fun! Great instructor!"
Mark Elvidge, Uplinkman Ltd. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (20/2/2017 t/m 24/2/2017)

"Wonderfull training.The trainer provided so much technical informations and Lab exercices. The course was really hands-on. "
Gbessi Vincent TOH, T-Inet Consulting. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (20/2/2017 t/m 24/2/2017)

"Bootcamp style, intensive training. Very experienced trainer - extremely knowledgable. Good material, nice location and amenities."
N.H. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (20/2/2017 t/m 24/2/2017)

"The material was appropriate, the delivery excellent. Loved the practices and the exercises. "
I.Y, Go Live UK Ltd. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (20/2/2017 t/m 24/2/2017)

"Amazing stay Very friendly staff Well presented course Always helpful & very informative Would come again :)"
Richard Howard, Microcomms. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (12/12/2016 t/m 16/12/2016)

"The instructor's knowledge and experience was very clear. The demonstrations and labs were very well constructed. The training facility was excellent."
T.W. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (28/11/2016 t/m 2/12/2016)

"I wouldn't get trained anywhere else."
R.B. - EC-Council Computer Hacking Forensics Investigator (CHFI v9) (5 Dagen) (28/11/2016 t/m 2/12/2016)

"The tutor has formidable knowledge. The environment was superb. I really enjoyed the course and content "
A.K. - EC-Council Computer Hacking Forensics Investigator (CHFI v9) (5 Dagen) (28/11/2016 t/m 2/12/2016)

"Excellent facilities that take care of all small stuff so you can concentrate on the learning."
Iain Bowker, Sopra Steria. - EC-Council Computer Hacking Forensics Investigator (CHFI v9) (5 Dagen) (28/11/2016 t/m 2/12/2016)

"Very good course, excellent anecdotal reinforcement from instructor. A good balance of theory and practical exercises. Facilities at Wyboston excellent."
James Metcalfe, 4secure Ltd. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (14/11/2016 t/m 18/11/2016)

"Another great course here at Firebrand, its tough but enjoyable!"
Lee Carter. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (14/11/2016 t/m 18/11/2016)

"The trainer is a great instructor. He teached us very well!"
J. M.. - EC-Council Certified Secure Programmer (ECSP) (5 Dagen) (24/10/2016 t/m 28/10/2016)

"A very good course and an excellent trainer. "
N.M. - EC-Council Certified Chief Information Security Officer (CCISO) (3 Dagen) (17/10/2016 t/m 19/10/2016)

"Excellent course, very experienced trainer "
Anoniem - EC-Council Certified Chief Information Security Officer (CCISO) (3 Dagen) (17/10/2016 t/m 19/10/2016)

On this accelerated 4 day Certified Network Defender course you will develop your understanding of network security technologies and operations.

We live in a digital age where cyber crime poses an ever increasing threat to individuals and businesses alike. In order to prevent costly and destructive breaches, you and your organisation must be appropriately skilled and aware of the potential threats. The CND course will teach you the critical skills necessary to protect detect and respond to cyber attacks.

Your EC-Council certified instructor will employ Firebrand’s unique Lecture | Lab | Review technique, making use of theoretical content as well as hands-on tasks on major network security tools and techniques. Made up of 50% practical work this course will provide network administrators with real-world expertise on current network security technologies and operations such as:

  • Network security controls, protocols and devices
  • Security policies for your organisation
  • Choosing appropriate firewall solution, topology and configurations
  • Risk and vulnerability assessment
  • First response to a network security incident

On this course you’ll be prepared to sit the Certified Network Defender (CND) 312-38 exam. You’ll sit this on-site, during the course, covered by your Certification Guarantee.

This course, which is 20% faster than traditional training, is ideal if you're a Network Administrator, Network Security Administrator, Network Security Engineer or you're involved in network operations.

8x Accredited Training Centre of the Year

Accredited Training Centre of the Year

Firebrand Training has again won the EC-Council Accredited Training Centre of the Year Award, from a Training Partner network that has more than 700 training centres across 107 countries. This extends a record-breaking run of successive awards to eight years.

Jay Bavisi, President of EC-Council said: “The annual EC-Council Awards highlights the commitment and achievements of our global partners and trainers that have contributed to the information security community.”

Lees meer ...

Belangstelling? Zie onze prijzen of bel ons op 024-8457770

  • Get certified 20% faster: Get trained in just 4 days compared with 5 days on other traditional courses. This means you’ll be back at work sooner, applying your new found skills.
  • EC-Council Official Curriculum: You will have access to official EC-Council curriculum, which means the content will be the most current and up-to-date.
  • EC-Council Certified Instructors: Our EC-Council instructors have years of industry-relevant knowledge, which can be used to provide valuable context to the course material.
  • Lecture | Lab | Review: This Firebrand technique employs a mixture of theoretical and practical work designed to help you retain information and develop the skills to apply your knowledge to real-world scenarios.

Lees meer ...

Belangstelling? Zie onze prijzen of bel ons op 024-8457770

In preparing you to become a Certified Network Defender, the CND course will cover the following domains in Cyber defence:

Module 01: Computer Network Defense Fundamentals

  • Network Fundamentals
  • Network Components
  • TCP/IP Networking Basics
  • TCP/IP Protocol Stack
  • IP Addressing
  • Computer Network Defense (CND)
  • CND Triad
  • CND Process
  • CND Actions
  • CND Approaches

Module 02: Network Security Threats, Vulnerabilities, and Attacks

  • Essential Terminologies
  • Network Security Concerns
  • Network Security Vulnerabilities
  • Network Reconnaissance Attacks
  • Network Access Attacks
  • Denial of Service (DoS) Attacks
  • Distributed Denial-of-Service Attack (DDoS)
  • Malware Attacks

Module 03: Network Security Controls, Protocols, and Devices

  • Fundamental Elements of Network Security
  • Network Security Controls
  • User Identification, Authentication, Authorisation and Accounting
  • Types of Authorisation Systems
  • Authorisation Principles
  • Cryptography
  • Security Policy
  • Network Security Devices
  • Network Security Protocols

Module 04: Network Security Policy Design and Implementation

  • What is Security Policy?
  • Internet Access Policies
  • Acceptable-Use Policy
  • User-Account Policy
  • Remote-Access Policy
  • Information-Protection Policy
  • Firewall-Management Policy
  • Special-Access Policy
  • Network-Connection Policy
  • Business-Partner Policy
  • Email Security Policy
  • Passwords Policy
  • Physical Security Policy
  • Information System Security Policy
  • Bring Your Own Devices (BYOD) Policy
  • Software/Application Security Policy
  • Data Backup Policy
  • Confidential Data Policy
  • Data Classification Policy
  • Internet Usage Policies
  • Server Policy
  • Wireless Network Policy
  • Incidence Response Plan (IRP)
  • User Access Control Policy
  • Switch Security Policy
  • Intrusion Detection and Prevention (IDS/IPS) Policy
  • Personal Device Usage Policy
  • Encryption Policy
  • Router Policy
  • Security Policy Training and Awareness
  • ISO Information Security Standards
  • Payment Card Industry Data Security Standard (PCI-DSS)
  • Health Insurance Portability and Accountability Act (HIPAA)
  • Information Security Acts: Sarbanes Oxley Act (SOX)
  • Information Security Acts: Gramm-Leach-Bliley Act (GLBA)
  • Information Security Acts: The Digital Millennium Copyright Act (DMCA) and Federal Information Security Management Act (FISMA)
  • Other Information Security Acts and Laws

Module 05: Physical Security

  • Physical Security
  • Access Control Authentication Techniques
  • Physical Security Controls
  • Other Physical Security Measures
  • Workplace Security
  • Personnel Security: Managing Staff Hiring and Leaving Process
  • Laptop Security Tool: EXO5
  • Environmental Controls
  • Physical Security: Awareness /Training
  • Physical Security Checklists

Module 06: Host Security

  • Host Security
  • OS Security
  • Linux Security
  • Securing Network Servers
  • Hardening Routers and Switches
  • Application/software Security
  • Data Security
  • Virtualisation Security

Module 07: Secure Firewall Configuration and Management

  • Firewalls and Concerns
  • What Firewalls Does?
  • What should you not Ignore?: Firewall Limitations
  • How Does a Firewall Work?
  • Firewall Rules
  • Types of Firewalls
  • Firewall Technologies
  • Firewall Topologies
  • Firewall Rule Set & Policies
  • Firewall Implementation
  • Firewall Administration
  • Firewall Logging and Auditing
  • Firewall Anti-evasion Techniques
  • Why Firewalls are Bypassed?
  • Full Data Traffic Normalisation
  • Data Stream-based Inspection
  • Vulnerability-based Detection and Blocking
  • Firewall Security Recommendations and Best Practices
  • Firewall Security Auditing Tools

Module 08: Secure IDS Configuration and Management

  • Intrusions and IDPS
  • IDS
  • Types of IDS Implementation
  • IDS Deployment Strategies
  • Types of IDS Alerts
  • IPS
  • IDPS Product Selection Considerations
  • IDS Counterparts

Module 09: Secure VPN Configuration and Management

  • Understanding Virtual Private Network (VPN)
  • How VPN works?
  • Why to Establish VPN ?
  • VPN Components
  • VPN Concentrators
  • Types of VPN
  • VPN Categories
  • Selecting Appropriate VPN
  • VPN Core Functions
  • VPN Technologies
  • VPN Topologies
  • Common VPN Flaws
  • VPN Security
  • Quality Of Service and Performance in VPNs

Module 10: Wireless Network Defense

  • Wireless Terminologies
  • Wireless Networks
  • Wireless Standard
  • Wireless Topologies
  • Typical Use of Wireless Networks
  • Components of Wireless Network
  • WEP (Wired Equivalent Privacy) Encryption
  • WPA (Wi-Fi Protected Access) Encryption
  • WPA2 Encryption
  • WEP vs. WPA vs. WPA2
  • Wi-Fi Authentication Method
  • Wi-Fi Authentication Process Using a Centralised Authentication Server
  • Wireless Network Threats
  • Bluetooth Threats
  • Wireless Network Security
  • Wi-Fi Discovery Tools
  • Locating Rogue Access points
  • Protecting from Denial-of-Service Attacks: Interference
  • Assessing Wireless Network Security
  • Wi-Fi Security Auditing Tool: AirMagnet WiFi Analyser
  • WPA Security Assessment Tool
  • Wi-Fi Vulnerability Scanning Tools
  • Deploying Wireless IDS (WIDS) and Wireless IPS (WIPS)
  • WIPS Tool
  • Configuring Security on Wireless Routers
  • Additional Wireless Network Security Guidelines

Module 11: Network Traffic Monitoring and Analysis

  • Network Traffic Monitoring and Analysis(Introduction)
  • Network Monitoring: Positioning your Machine at Appropriate Location
  • Network Traffic Signatures
  • Packet Sniffer: Wireshark
  • Detecting OS Fingerprinting Attempts
  • Detecting PING Sweep Attempt
  • Detecting ARP Sweep/ ARP Scan Attempt
  • Detecting TCP Scan Attempt
  • Detecting SYN/FIN DDOS Attempt
  • Detecting UDP Scan Attempt
  • Detecting Password Cracking Attempts
  • Detecting FTP Password Cracking Attempts
  • Detecting Sniffing (MITM) Attempts
  • Detecting the Mac Flooding Attempt
  • Detecting the ARP Poisoning Attempt
  • Additional Packet Sniffing Tools
  • Network Monitoring and Analysis
  • Bandwidth Monitoring

Module 12: Network Risk and Vulnerability Management

  • What is Risk?
  • Risk Levels
  • Risk Matrix
  • Key Risk Indicators(KRI)
  • Risk Management Phase
  • Enterprise Network Risk Management
  • Vulnerability Management

Module 13: Data Backup and Recovery

  • Introduction to Data Backup
  • RAID (Redundant Array Of Independent Disks) Technology
  • Storage Area Network (SAN)
  • Network Attached Storage (NAS)
  • Selecting Appropriate Backup Method
  • Choosing the Right Location for Backup
  • Backup Types
  • Conducting Recovery Drill Test
  • Data Recovery
  • Windows Data Recovery Tool
  • RAID Data Recovery Services
  • SAN Data Recovery Software
  • NAS Data Recovery Services

Module 14: Network Incident Response and Management

  • Incident Handling and Response
  • Incident Response Team Members: Roles and Responsibilities
  • First Responder
  • Incident Handling and Response Process
  • Overview of IH&R Process Flow

Lees meer ...

Belangstelling? Zie onze prijzen of bel ons op 024-8457770

You will sit the Certified Network Defender (CND) 312-38 exam on-site as part of the course. This is covered by your Certification Guarantee.

  • Exam Title: CND
  • Exam code: 312-38
  • Number of questions: 100
  • Duration: 4 Hours
  • Availability: ECC Exam
  • Test Format: Interactive Multiple Choice Questions

Lees meer ...

Belangstelling? Zie onze prijzen of bel ons op 024-8457770

As part of your accelerated course, you'll get access to EC-Council Official Curriculum.

Lees meer ...

Belangstelling? Zie onze prijzen of bel ons op 024-8457770

There are currently no prerequisites for this course but having a basic understanding of Network Security will help.

Weet je niet zeker of je voldoet aan de vereisten?

Firebrand levert in een afleidingsvrije omgeving waardoor je je volledig kan focussen op de te bestuderen materie. We bespreken graag jouw technische achtergrond, ervaring en kwalificaties om vast te stellen of deze versnelde cursus voor jou geschikt is.

Belangstelling? Zie onze prijzen of bel ons op 024-8457770