Preparation Course: Certified Network Defender
By the end of this course, participants will be able to:
- Implement an Adaptive Security Strategy, thereby increasing the scope from Protect – Detect – Respond to Protect – Detect – Respond – Predict.
- Understand and deal with the Latest Technologies such as Software Defined Network (SDN) security, Network Function Virtualization (NFV) security, container security, docker security, and Kubernetes security.
- Establish A Dedicated Module on IoT Security
- Understand network security management.
- Learn basics of first response and forensics
- Establish network security policies and procedures.
- Understand indicators of Compromise, Attack, and Exposures (IoC, IoA, IoE)
- Perform the tasks related to Windows and Linux security administration.
- Build threat intelligence capabilities
- Set up mobile and IoT device security
- Establish and monitor log management
- Implement data security techniques on networks
- Implement endpoint security
- Embed virtualization technology security
- Configure optimum firewall solutions
- Establish Network Authentication, Authorization, Accounting (AAA)
Module 1 - Security and Defence Strategies
1 Parts
- Network Attacks and Defense Strategies
- Administrative Network Security
- Technical Network Security
- Network Perimeter Security
- Endpoint Security-Windows Systems
- Endpoint Security-Linux Systems
- Endpoint Security- Mobile Devices
- Endpoint Security-IoT Devices
- Administrative Application Security
- Data Security
- Enterprise Virtual Network Security
- Enterprise Cloud Network Security
- Enterprise Wireless Network Security
Module 2 - Monitoring, Analysis and Forensic Investigation
1 Parts
- Network Traffic Monitoring and Analysis
- Network Logs Monitoring and Analysis
- Incident Response and Forensic Investigation
Module 3 - Risk Management and Business Continuity Management
1 Parts
- Business Continuity and Disaster Recovery
- Risk Anticipation with Risk Management
- Threat Assessment with Attack Surface Analysis
- Threat Prediction with Cyber Threat Intelligence
Saudi Arabia
Egypt
UAE
Canada