0(0)

CND V2 Certification Training Course

  • Course level: Intermediate

Description

Network security is indeed a vast, evolving and complex field where the person is required to be equipped with knowledge and skills on preparing, mitigating and responding to common attack directions. Else, the network can be easily prone to attacks like ransomware that have been widely seen across all the companies around the world. Moreover, Cyber-security is a non-linear process which definitely needs a continuous approach that will be able to mitigate cyber risks. By means of developing a continuous Adaptive Security cycle and by creating and improving security systems, the organizations can stay ahead of cybercriminals.

What Will I Learn?

  • Network security management
  • Windows and Linux security administration
  • Mobile and IoT device security
  • Data security techniques
  • Network security policies and procedures
  • Virtualization technology security
  • Cloud and wireless security
  • Risk assessment tools
  • Indicators of Compromise, Exposures and Attack (IoC, IoE, IoA)
  • Log management
  • Endpoint security
  • Basics of first response & forensics
  • Threat intelligence capabilities
  • Firewall solutions
  • Network Authentication, Authorization, Accounting (AAA)
  • IDS/IPS technologies
Free

Material Includes

  • Duration: Full-time-5 Days
  • Duration: Part-time-5 Saturdays
  • 28 hours on-demand video
  • 11 articles
  • 1 downloadable resource
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion

Requirements

  • If you are the one who have completed an official EC-Council training either at an Accredited Training Center, through the iClass platform, or at an approved academic institution, then you are eligible to present at the relevant EC-Council exam without the need to go for the application process.

Target Audience

  • Network Administrator/Engineer
  • Cybersecurity Engineer, Network Defense Technician, Security Analyst, Security Operator
  • Network Security Administrator, or Engineer or an Analyst
  • For those who involved in cyber-security operations roles
  • For those who aspires to build a career in cyber-security