NDE – Network Defense Essentials (e-Learning)

Nacional
365 Dias

Validade do curso

14 Horas

Tempo estimado em horário livre

Chat
Spring Deals: Cursos EC-Council com 5% de desconto até 30 de abril

The Network Defense Essentials (NDE) covers the fundamental concepts of information security and network defense, providing a holistic overview of identification, authentication, authorization, visualization, and more. No IT/Cybersecurity experience required for this course.

Test your skills with CTF-based Capstone Project and validate these newly acquired skills in proctored exams. With 12 modules, 14+ hours of premium self-paced video training, and 11 interactive labs, the series enables you to add formal recognition to your resume, demonstrating your skills and expertise to employers.

Key Features:

  • 14+ hours of premium self-paced video training
  • 11 hands-on lab activities in a simulated lab environment
  • 750+ pages of e-courseware
  • Capstone project
  • 1-year access to courseware and 6-month access to labs
  • Proctored exam voucher with 1-year validity
  • Globally recognized EC-Council certification
  • Increased value in the job market to advance your career

What skills you’ll learn:

  • Key issues plaguing network security.
  • Essential network security protocols.
  • Identification, authentication, and authorization concepts.
  • Network security controls:
    • Administrative controls (frameworks, laws, acts, and security policies).
    • Physical controls (physical security controls, workplace security, and environmental controls).
    • Technical controls (network segmentation, firewall, IDS/IPS, honeypot, proxy server, VPN, SIEM, UBA, and anti-malware).
  • Fundamentals of virtualization, cloud computing, and cloud security.
  • Wireless network fundamentals, wireless encryption, and security measures.
  • Fundamentals of mobile and IoT devices and their security measures.
  • Cryptography and PKI concepts.
  • Data security, data encryption, and data backup and data loss prevention techniques.
  • Network traffic monitoring for suspicious traffic.

Vídeo

Destinatários

Who is NDE for?

  • High School/ College/University students
  • Teams and organizations
  • Career starters
  • Working professionals

Pré-Requisitos

No prior cybersecurity knowledge or IT work experience required.

Metodologia

Training Details: Self-paced, in-demand lecture videos led by world-class instructors and hands-on labs.

Exam Details:

  • Exam Code: 112-51
  • Number of Questions: 75
  • Duration: 2 hours
  • Test Format: Multiple Choice

Programa

Network Security Fundamentals

  • Fundamentals of Network Security
  • Network Security Protocols

Identification, Authentication and Authorization

  • Access Control Principles, Terminologies, and Models
  • Identity and Access Management (IAM) Concepts

Lab Exercise:

  • Implementing Access Controls in Windows Machine
  • Managing Access Controls in Linux Machine
  • Implementing Role-Based Access Control in Windows Admin Center (WAC)

Network Security Controls – Administrative Controls

  • Regulatory Frameworks, Laws, and Acts
  • Design and Develop Security Policies
  • Conduct Different Types of Security and Awareness Training

Lab Exercise:

  • Implementing Password Policies Using Windows Group Policy

Network Security Controls – Physical Controls

  • Importance of Physical Security
  • Physical Security Controls
  • Workplace Security
  • Environmental Controls

Network Security Controls – Technical Controls

  • Types of Network Segmentation
  • Types of Firewalls and their Role
  • Types of IDS/IPS and their Role
  • Types of Honeypots
  • Types of Proxy Servers and their Benefits
  • Fundamentals of VPN and its importance in Network Security
  • Security Incident and Event Management (SIEM)
  • User Behavior Analytics (UBA)
  • Antivirus/Anti-malware Software

Lab Exercise:

  • Implementing Host-Based Firewall Protection with iptables
  • Implementing Host-Based Firewall Functionality Using Windows Firewall
  • Implementing Network-Based Firewall Functionality: Blocking Unwanted Website access using pfSense Firewall
  • Implementing Network-Based Firewall Functionality: Blocking Insecure Ports using pfSense Firewall
  • Implementing Host-Based IDS functionality using Wazuh HIDS
  • Implementing Network-based IDS Functionality Using Suricata IDS
  • Detect Malicious Network Traffic using HoneyBOT
  • Establishing Virtual Private Network Connection using SoftEther VPN

Virtualization and Cloud Computing

  • Virtualization Essential Concepts and OS
  • Virtualization Security
  • Cloud Computing Fundamentals
  • Insights of Cloud Security and Best Practices

Lab Exercise:

  • Auditing Docker Host Security Using Docker-Bench-Security Tool
  • Implementing AWS Identity and Access Management
  • Securing Amazon Web Services Storage

Wireless Network Security

  • Wireless Network Fundamentals
  • Wireless Network Encryption Mechanisms
  • Types of Wireless Network Authentication Methods
  • Implement Wireless Network Security Measures

Lab Exercise:

  • Configuring Security on a Wireless Router

Mobile Device Security

  • Mobile Device Connection Methods
  • Mobile Device Management Concepts
  • Common Mobile Usage Policies in Enterprises
  • Security Risks and Guidelines Associated with Enterprises Mobile Usage Policies
  • Implement Enterprise-level Mobile Security Management Solutions
  • Implement General Security Guidelines and Best Practices on Mobile Platforms

Lab Exercise:

  • Implementing Enterprise Mobile Security Using Miradore MDM Solution

IoT Device Security

  • IoT Devices, Application Areas, and Communication Models
  • Security in IoT-enabled Environments

Lab Exercise:

  • Securing IoT Device Communication Using TLS/SSL

Cryptography and PKI

  • Cryptographic Techniques
  • Cryptographic Algorithms
  • Cryptography Tools
  • Public Key Infrastructure (PKI)

Lab Exercise:

  • Calculate One-way Hashes using HashCalc
  • Calculate MD5 Hashes using HashMyFiles
  • Create a Self-signed Certificate

Data Security

  • Data Security and its Importance
  • Security Controls for Data Encryption
  • Data Backup and Retention
  • Data Loss Prevention Concepts

Lab Exercise:

  • Perform Disk Encryption using VeraCrypt
  • File Recovery Using EaseUS Data Recovery Wizard
  • Backing Up and Restoring Data in Windows

Network Traffic Monitoring

  • Need and Advantages of Network Traffic Monitoring
  • Determine Baseline Traffic Signatures for Normal and Suspicious Network Traffic
  • Perform Network Monitoring for Suspicious Traffic

Lab Exercise:

  • Capturing Network Traffic using Wireshark
  • Applying Various Filters in Wireshark
  • Analyzing and Examining Various Network Packet Headers in Linux using tcpdump
Chat

Quero saber mais informações sobre este curso

NDE – Network Defense Essentials (e-Learning)

EC-Council | 14h - e-learning, validade 365 dias


Notas

Pretende mais informação sobre este curso?

Preencha o formulário com os seus dados e as suas questões e entraremos em contacto consigo para lhe darmos todas as informações pretendidas.

Obrigado!

Quero inscrever-me neste curso

NDE – Network Defense Essentials (e-Learning)

EC-Council | 14h - e-learning, validade 365 dias


Dados Pessoais
Dados para faturação

Os seus dados pessoais são recolhidos em conformidade com o Regulamento Geral de Proteção de Dados (RGPD).

A confirmação da adjudicação ou aceitação do serviço implica a aceitação da nossa Política de Privacidade. Nos casos em que a adjudicação ou aceitação do serviço não seja realizada diretamente pelo titular dos dados, compete à entidade adjudicante assegurar a comunicação da referida Política de Privacidade ao respetivo titular.


Consente que os seus dados sejam utilizados para o contacto / envio de materiais de marketing sobre produtos e serviços da GALILEU?