Certified Cyber Network Defender, CCND
Cyber network defenders help create computer systems that can handle sensitive data and withstand external cyber threats. They also review networks that already are in place in order to identify potential threats or to respond to immediate threats.
Specific knowledge includes expertise in automated information systems (AIS) security; computer terminal devices; networking theory and concepts, Windows and UNIX operating systems; procedural actions in telecommunications operations such as message formatting, processing incoming/outgoing messages, and service actions; and training on communications security equipment and devices.
- Cyber Network Defender Duties & Responsibilities generally requires the ability to do the following work:
Implement hardware and software infrastructures - Test hardware and software infrastructures
- Assess the general strengths and likely vulnerabilities of networks
- Analyse specific issues to identify threats or potential threats
- Respond to immediate cyber threats
- Provide detailed reports to review issues or potential issues and solutions or potential solutions
Course Style
Live Instructor Led. Face-to-face or attend from anywhere.
What is included?
- 10 Days of training
- Course material/Slides.
- Classroom training Or attend from anywhere.
- Training delivered by Professionals with enormous industry experience.
- Labs with Virtual machines
- Total comprehensive exam preparation.
What you will Learn?
- Cyber-attack types and terminology from Network, web application, client side, devices, and OS attacks point of view.
- Cyber related laws and regulation focusing on UK laws and world-wide regulations
- Networking protocols, cablings and network types and networking device
- How to secure Windows OS and services, patching, AD security, disk encryption, LAPS, AppLocker, JEA/JIT administration, how to use baselines templated to secure Windows servers and workstations.
- How to secure Linux OS and services, patching, OS and application virtualization on Linux, how to install and secure commonly used services: SSH, apache web server, nginx, samba. How to implement password policies and AppArmor.
- How to configure firewalls, proxies, IDS/IPS, routers and VPNs
- How to protect clients on Wi-Fi networks and how to implement Enterprise security enabled Wi-Fi
- Cloud terminology and migration caveats
- How to handle the incidents and utilize MITRE ATT@CK framework and Cyber Kill Chain during the incident handling
- Use computer forensics during the Incident handling process, and understand how to collect, preserve, and maintain the integrity of the digital evidence by using bit-stream copy, chain of custody and hashing techniques. How to analyse HDD image, memory image and EXIF information inside the files. How to do a simple malware analysis.
- Use different tools to analyse network traffic and network and OS logs, and how to use advanced tools for centralised log management and SIEM and how to utilize external knowledge through Threat intelligence.
Who should attend?
- System Administrators
- Network Administrators
- Security Administrators
- Anyone who need to learn and understand how to securely configure network infrastructures
Course Dates
8 – 20 Jan, 2024
11 – 22 Mar, 2024
13 – 24 May, 2024
15 – 26 Jul, 2024
09 – 20 Sep, 2024
18 – 29 Nov, 2024
Course Outline
- Network attacks: MitM, ARP spoofing, SSL strip, HTTPS MitM
- Web app attacks: OWASP top 10, LFI/RFI, DoR
- Client-side attacks: Phishing, spear phishing, browser attack
- Device attacks: Routers and firewalls historical exploits
- OS attacks: AD, BoF
- Terminology: Data at rest, data in transit and data in use explained, other terminology needed for the course
- UK cyber related laws and regulations
- World-wide regulations
- Protocols: TCP/IP suite of protocols, TCP, UDP, IP, OSI model, TCP/IP model
- Cabling and network types
- Devices: NIC, hub, switch, router, firewall, IDS/IPS
- AD basics, security features, baseline configuration, patch management hardening
- Windows security features: BitLocker, JEA/JIT administration, LAPS, AppLocker
- Baselines and hardening
- Patch management
- AD basics
- OS and Application virtualization on Windows
- Linux security features
- Patching Linux
- Hardening Linux
- OS and Application virtualization on Linux
- Firewall types and usage
- IDS/IPS explained: Classification, deployment, false positives, false negatives, true positives and true negatives
- Routing explained
- VPN explained: VPN types, implementation options
Prerequisites
Basic OS administration knowledge