Certified Network Defender (CND)


Certified Network Defender (CND)

EC-Council has reviewed the entire CND space as designated by the Department of Defense as IAT I, II, III and IAM I, II, III as well as the NICE Framework KSAs as they relate to cyber defense and day-to-day cyber operations. With each of these considered, we built our exam blueprint, overall training scope, and got to work building the next certification we believe will be a game changer for cyber security professionals - Certified Network Defender.

The class is a professional level introduction to the cyber defense strategies needed in today''s critical infrastructure.

  • Network security management
  • Network security policies and procedures
  • Windows and Linux security administration
  • Mobile and IoT device security
  • Data security techniques
  • Virtualization technology security
  • Cloud and wireless security
  • Risk assessment tools
  • Basics of first response and forensics
  • Indicators of Compromise, Attack, and Exposures (IoC, IoA, IoE)
  • Threat intelligence capabilities
  • Log management
  • Endpoint security
  • Firewall solutions
  • IDS/IPS technologies
  • Network Authentication, Authorization, Accounting (AAA)

  • System administrators
  • System engineers
  • Firewall administrators
  • Network managers
  • IT managers
  • IT professionals
  • Anyone interested in network security technologies
  • Managers who want to understand cyber security core principles and practices
  • Operations personnel, who although do not have security as their primary job function, will need an understanding of cyber security core principles and practices

You should be well-versed in cyber security fundamentals.

1. Computer Network Defense Fundamentals

2. Network Security Threats, Vulnerabilities, and Attacks

3. Network Security Controls, Protocols, and Perimeter Appliances

4. Secure Firewall Configuration, Deployment and Management

5. Secure IDS Configuration and Management

6. Secure VPN Configuration and Management

7. Designing a Secure Network

8. Network Traffic Signatures and Analysis

9. Monitoring and Securing Network Traffic

10. Network Vulnerability Scanning

11. Monitoring and Securing Network Traffic

12. Network Vulnerability Scanning

13. Host/System Security

14. Physical Security

15. Designing and Implementation of Network Security Policies

16. Network Incident Response and Management

17. Network Backup and Disaster Recovery

18. Wireless Network Defense

Upcoming Classes

Dates Location GTR  
Dec 5-9 (8:30am-4:30pm) EST Guaranteed to Run
Jan 9-13 (8:30am-4:30pm) EST
Mar 6-10 (8:30am-4:30pm) EST
Apr 3-7 (8:30am-4:30pm) EST
Apr 10-14 (11:30am-7:30pm) EST


Whether you need assistance scheduling a class for yourself or for your group, GCA's Education Account Manager's will craft a customized training solution to meet the needs of your organization.