0% found this document useful (0 votes)
208 views1 page

CND Certified Network Defender

The Certified Network Defender course outline covers 20 modules focused on a wide range of network and cybersecurity topics, from network attacks and defense strategies to risk management and threat prediction. Key areas include administrative and technical network security, perimeter security, endpoint security across different operating systems and devices, application security, data security, virtual and cloud network security, wireless security, traffic monitoring and analysis, log analysis, incident response, business continuity, risk assessment, threat analysis, and cyber threat intelligence.

Uploaded by

MOHAMED SHARKAWI
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
208 views1 page

CND Certified Network Defender

The Certified Network Defender course outline covers 20 modules focused on a wide range of network and cybersecurity topics, from network attacks and defense strategies to risk management and threat prediction. Key areas include administrative and technical network security, perimeter security, endpoint security across different operating systems and devices, application security, data security, virtual and cloud network security, wireless security, traffic monitoring and analysis, log analysis, incident response, business continuity, risk assessment, threat analysis, and cyber threat intelligence.

Uploaded by

MOHAMED SHARKAWI
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

CND.

Certified Network Defender course


-------------------------
Course Outline

Module 01: Network Attacks and Defense Strategies


Module 02: Administrative Network Security
Module 03: Technical Network Security
Module 04: Network Perimeter Security
Module 05: Endpoint Security-Windows Systems
Module 06: Endpoint Security-Linux Systems
Module 07: Endpoint Security- Mobile Devices
Module 08: Endpoint Security-IoT Devices
Module 09: Administrative Application Security
Module 10: Data Security
Module 11: Enterprise Virtual Network Security
Module 12: Enterprise Cloud Network Security
Module 13: Enterprise Wireless Network Security
Module 14: Network Traffic Monitoring and Analysis
Module 15: Network Logs Monitoring and Analysis
Module 16: Incident Response and Forensic Investigation
Module 17: Business Continuity and Disaster Recovery
Module 18: Risk Anticipation with Risk Management
Module 19: Threat Assessment with Attack Surface Analysis
Module 20: Threat Prediction with Cyber Threat Intelligence

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy