Learning Options

  • Online Video-Based Learning
  • Flexible Schedule
  • Expert Trainers with Industry Experience
  • High Pass Rates
  • 24/7 Personalised Support
  • Interactive Learning Materials
  • Live Online Classes
  • Expert Trainers with Industry Experience
  • Live Assessment and Feedback
  • Interactive Learning Materials
  • Networking Opportunities
  • High Pass Rates

Overview

The Certified Network Defender (CND) Certification course is designed for professionals seeking to enhance their skills in network security. This 5-day course provides learners with the tools and techniques needed to secure and defend networks against a wide variety of cyber threats. Whether you're new to network security or looking to refine your skills, this course will equip you with the knowledge to effectively monitor, secure, and respond to potential network vulnerabilities.

Throughout the course, delegates will gain a thorough understanding of network defence strategies, including the configuration and management of firewalls, intrusion detection systems (IDS), and other critical network security technologies. With practical labs, real-world case studies, and interactive exercises, you will develop the hands-on experience needed to prevent cyber-attacks, identify security incidents, and manage network traffic efficiently.

Upon completion of this 5-day course, delegates will have the expertise to implement comprehensive network security measures, mitigate potential threats, and respond effectively to security breaches, ensuring the protection and integrity of their organisation’s IT infrastructure.
 

Course Objectives
 

  • Understand the key principles of network security and risk management.
  • Learn to configure and manage network security devices, including firewalls and intrusion detection systems (IDS).
  • Gain experience with network monitoring tools and techniques.
  • Learn how to protect networks from common cyber threats such as DoS attacks, malware, and phishing.
  • Develop incident response strategies and learn how to handle network breaches effectively.

Upon completion, delegates will be able to implement robust network security measures, monitor network traffic for potential threats, and defend their organisations from a wide range of cyber threats.

calender

Average completion time

5 Month
wifi

with unlimited support

100% online
clock

Start anytime

Study At Your Own Pace

Course Includes

Course Details

Develop your understanding of essential financial, business and management accounting techniques with ACCA Applied Knowledge. You'll learn basic business and management principles and the skills required of an accountant working in business.

Entry Requirements

    • Educational Background: Basic knowledge of IT networking and cybersecurity concepts is recommended. 

    • Professional Experience: Prior experience in IT or network management is beneficial but not mandatory. 

    • Language Proficiency: Proficiency in English is essential for participation and assessments. 

Learning Outcomes

    • Network Defence Tools: Gain hands-on experience with firewalls, intrusion detection systems (IDS), and other network defence technologies. 

    • Security Protocols: Learn to implement and manage network security protocols, including VPNs, IPSec, and SSL. 

    • Network Traffic Monitoring: Understand how to monitor network traffic and identify suspicious or malicious activity using monitoring tools. 

    • Incident Response: Learn how to respond to security incidents and handle network breaches effectively, ensuring minimal disruption. 

    • Risk Management: Develop an understanding of risk management techniques, including vulnerability assessments and network security policies. 

Target Audience


    This course is ideal for IT professionals responsible for network security, including: 

    • Network Engineers 

    • IT Security Analysts 

    • Systems Administrators 

    • Network Architects 

    • Security Consultants 

    • Incident Response Teams 

    • IT Managers 

Course content


    Module 1: Network Attacks and Defence Strategies

    • Attack

    • Threat

    • Threat Sources

    • Threat Actors

    • Vulnerability

    • Risk

    • Network Attacks

    • Application Attacks

    • Social Engineering Attacks

    • Email Attacks

    • Mobile Attacks

    • Cloud Attacks

    • Supply Chain Attacks

    • Wireless Attacks

    • Hacking Methodologies and Frameworks

    • Adaptive Security Strategy

    • Defence-in-depth Security
       

    Module 2: Administrative Network Security

    • Compliance

    • Regulatory Frameworks

    • Security Policies

    • Security Awareness

    • Asset Management

    • Recent Cybersecurity Trends
       

    Module 3: Technical Network Security

    • Access Controls

    • Authentication

    • Authorisation

    • Accounting (AAA)

    • IAM

    • Cryptography

    • Network Segmentation

    • Zero Trust

    • Network Security Controls

    • Network Security Protocols
       

    Module 4: Network Perimeter Security

    • Firewalls

    • Firewall Types

    • Firewall Topologies

    • Firewall Selection

    • Firewall Implementation and Deployment

    • Firewall Administration

    • IDS/IPS

    • IDS/IPS Classification

    • IDS/IPS Selection

    • False Positives

    • False Negatives

    • Router Security

    • Switch Security

    • Software-defined Perimeter (SDP)
       

    Module 5: Endpoint Security-Windows Systems

    • Windows Security Risks

    • Windows Security Components

    • Windows Security Features

    • Windows Security Baseline Configurations

    • User Account and Password Management

    • Windows Patch Management

    • Windows User Access Management

    • Active Directory Security

    • Windows Network Services and Protocol Security

    • Windows Security Best Practices
       

    Module 6: Endpoint Security-Linux Systems

    • Linux Security Risks

    • Linux Installation and Patching

    • Linux User Access and Password Management

    • Linux OS Hardening Techniques

    • Linux Network and Remote Access Security

    • Linux Security Tools and Frameworks
       

    Module 7: Endpoint Security- Mobile Devices

    • Bring Your Own Device (BYOD)

    • Choose Your Own Device (CYOD)

    • Corporate Owned, Personally Enabled (COPE)

    • Company Owned, Business Only (COBO)

    • Mobile Device Management (MDM)

    • Mobile Application Management (MAM)

    • Mobile Threat Defence (MTD)

    • Unified Endpoint Management (UEM)

    • Mobile Email Management (MEM)

    • Mobile Content Management (MCM)

    • Enterprise Mobility Management (EMM)

    • Mobile Device Security

    • Android Security

    • iPhone Security
       

    Module 8: Endpoint Security-IoT Devices

    • IoT Devices

    • IoT Application Areas

    • IoT Ecosystem

    • IoT Communication Models

    • IoT-Enabled Environments

    • IoT Security Risk and Challenges

    • IoT Security in IoT-Enabled IT Environments

    • IoT Security Tools

    • IoT Security Best Practices

    • IoT Security Standards, Initiatives, and Efforts
       

    Module 9: Administrative Application Security

    • Application Whitelisting

    • Application Blacklisting

    • Application Sandboxing

    • Application Patch Management

    • Web Application Firewalls (WAFs)
       

    Module 10: Data Security

    • Data Security

    • Data Encryption Data at Rest

    • Data Encryption at Transit

    • Data Masking

    • Data Backup

    • Data Retention

    • Data Destruction

    • Data Loss Prevention (DLP)

    • Data Integrity
       

    Module 11: Enterprise Virtual Network Security

    • Network Virtualisation (NV)

    • Software-defined Network (SDN)

    • Network Function Virtualisation (NFV) Security

    • OS Virtualisation Security

    • Container Security

    • Docker Security

    • Kubernetes Security
       

    Module 12: Enterprise Cloud Network Security

    • Cloud Computing

    • Cloud Security

    • Shared Responsibility Model

    • Amazon Cloud (AWS) Security

    • Microsoft Azure Cloud Security

    • Google Cloud Platform (GCP) Security
       

    Module 13: Enterprise Wireless Network Security

    • Wireless Network

    • Wireless Standards

    • Wireless Topologies

    • Wireless Network Components

    • Wireless Network Encryption

    • Wireless Network Authentication

    • Wireless Network Security Measures

    • Wi-Fi Security Tools
       

    Module 14: Network Traffic Monitoring and Analysis

    • Network Traffic Monitoring

    • Baseline Traffic Signatures

    • Suspicious Network Traffic Signatures

    • Threat Detection with Wireshark

    • Bandwidth Monitoring

    • Performance Monitoring

    • Network Anomaly Detection

    • Behaviour Analysis
       

    Module 15: Network Logs Monitoring and Analysis

    • Logs

    • Windows Log Analysis

    • Linux Log Analysis

    • Mac Log Analysis

    • Firewall Log Analysis

    • Router Log Analysis

    • Web Server Log Analysis

    • Centralised Log Management
       

    Module 16: Incident Response and Forensic Investigation

    • First Responder

    • Incident Handling and Response Process

    • SOAR

    • Endpoint Detection and Response (EDR)

    • Extended Detection and Response (XDR)

    • Forensics Investigation
       

    Module 17: Business Continuity and Disaster Recovery

    • Business Continuity (BC)

    • Disaster Recovery (DR)

    • Business Continuity Management (BCM)

    • BC/DR Activities

    • Business Impact Analysis (BIA)

    • Recovery Time Objective (RTO)

    • Recovery Point Objective (RPO)

    • Business Continuity Plan (BCP)

    • Disaster Recovery Plan (DRP)
       

    Module 18: Risk Anticipation with Risk Management

    • Risk Management

    • Risk Identification

    • Risk Assessment

    • Risk Treatment

    • Risk Treatment Steps

    • Risk Tracking and Review

    • Risk Management Frameworks (RMFs)

    • Vulnerability Management

    • Vulnerability Scanning

    • Vulnerability Reporting

    • Privacy Impact Assessment (PIA)
       

    Module 19: Threat Assessment with Attack Surface Analysis

    • Attack Surface

    • Attack Surface Analysis

    • System Attack Surface

    • Network Attack Surface

    • Software Attack Surface

    • Physical Attack Surface

    • Human Attack Surface

    • Indicators of Exposures (IoEs)

    • Attack Simulation

    • Attack Surface Reduction

    • Attack Surface Monitoring Tools

    • Cloud and IoT Attack Surface Analysis
       

    Module 20: Threat Prediction with Cyber Threat Intelligence

    • Cyber Threat Intelligence

    • Threat Intelligence Types

    • Indicators of Compromise (IoCs)

    • Indicators of Attack (IoA)

    • Threat Intelligence Layers

    • Threat Intelligence Sources

    • Threat Intelligence Feeds

    • Threat Intelligence Platforms (TIP)

    • Threat Hunting

MPES Support That Helps You Succeed

At MPES, we offer comprehensive support to help you succeed in your studies. With expert guidance and valuable resources, we help you stay on track throughout your course.

  • MPES Learning offers dedicated support to help you succeed in Accounting and Finance courses.
  • Get expert guidance from tutors available online to assist with your studies.
  • Check your eligibility for exemptions with the relevant professional body before starting.
  • Our supportive team is here to offer study advice and support throughout your course.
  • Access a range of materials to help enhance your learning experience. These resources include practice exercises and additional reading to support your progress.

Career Growth Stories

MPES Learning offers globally recognised courses in accounting,

Need help with your ACCA course?

Our course advisors are here to help guide you and ensure that you choose the right course for you and your career journey.

Have Questions? We’ve Got You

If you have any questions, we’re here to help. Find the answers you need in the MPES detailed FAQ section.

Q. What is network defence?

Network defence refers to the strategies, tools, and techniques used to protect an organisation’s network from cyber threats and attacks. It involves managing firewalls, intrusion detection systems, monitoring network traffic, and implementing security measures to safeguard the network from vulnerabilities and breaches. 

Q. How does this course enhance my career in network security?

The CND certification provides professionals with in-depth knowledge of network security and defence strategies, making them more capable of protecting IT infrastructure. By mastering network defence techniques, delegates will be equipped to take on key roles in cybersecurity, including network security administration, risk management, and incident response. 

Q. What tools will I use during the course?

During the course, delegates will work with industry-standard tools used in network defence, including firewalls, intrusion detection/prevention systems (IDS/IPS), and network monitoring software. Practical labs will provide experience in using these tools to detect, defend, and respond to network threats in real-world scenarios. 

Q. Is this course suitable for beginners?

The CND course is designed for professionals with a foundational understanding of networking and cybersecurity principles. While prior experience in network security is not mandatory, a basic knowledge of networking concepts and IT systems will help delegates make the most of the course content and practical exercises. 

Q. What practical skills will I gain from this course?

Delegates will gain hands-on experience with network defence tools and techniques, including configuring firewalls, monitoring network traffic, and responding to security incidents. They will learn how to secure networks from common threats, implement security policies, and manage security devices to ensure robust protection against cyber-attacks. 

Related Course

Explore additional courses designed to complement your learning journey and enhance your professional skills. Expand your knowledge with these expertly curated options tailored to your career goals.

Certified Penetration Testing Professional (CPTP) Certification Course Go To Course blue-arrow
Computer Hacking Forensic Investigator (CHFI) Certification Go To Course blue-arrow
Certified Cloud Security Engineer Certification Go To Course blue-arrow
Certified Network Defender (CND) Certification Go To Course blue-arrow
Certified DevSecOps Engineer Certification Go To Course blue-arrow
View More

Resources

Access a wide range of free resources to support your learning journey. From blogs to news and podcasts, these valuable guides are available at no cost to help you succeed.

Course Schedule

Course Schedule

£4995

Certified Network Defender (CND) Certification

Mon 16th Sep 2024

Fri 20th Sep 2024

Duration - 5 Days

DELIVERY METHOD

Virtual

£4995

Certified Network Defender (CND) Certification

Mon 2nd Dec 2024

Fri 6th Dec 2024

Duration - 5 Days

DELIVERY METHOD

Virtual