{"course":{"productid":18607,"modality":1,"active":true,"language":"fr","title":"EC-Council Certified Network Defender","productcode":"CND","vendorcode":"EC","vendorname":"EC-Council","fullproductcode":"EC-CND","courseware":{"has_ekit":false,"has_printkit":true,"language":""},"url":"https:\/\/portal.flane.ch\/course\/ec-cnd","objective":"<ul>\n<li>Plan, implement, and administer network security management for an organization.<\/li><li>Gain knowledge of various security risks, threats, and vulnerabilities.<\/li><li>Assist in obtaining and maintaining an organization&#039;s compliance with required regulatory standards and frameworks.<\/li><li>Design and implement network security policies and procedures .<\/li><li>Apply security principles, protocols, and controls that suit today&#039;s distributed and mobile computing environment.<\/li><li>Apply strong Identity and Access Management (IAM), network segmentation, and encryption techniques to strengthen the organization&#039;s network.<\/li><li>Manage and maintain Windows Security Administration.<\/li><li>Manage and maintain Linux Security Administration.<\/li><li>Manage and mitigate the security risks and challenges associated with the enterprise&#039;s mobile device usage policies.<\/li><li>Manage and mitigate the security risks and challenges associated with IoT devices used in enterprises.<\/li><li>Implement strong data security techniques to secure an organization&#039;s data.<\/li><li>Implement and manage the security of virtualization technologies, i.e., Network Virtualization (NV), Software Defined Network (SDN),<\/li><li>Network Function Virtualization (NFV), OS Virtualization, Containers, Dockers, and Kubernetes used in modern-day networks.<\/li><li>Implement and manage cloud security on various cloud platforms such as AWS, Azure, Google Cloud Platform, etc.<\/li><li>Implement and manage wireless network security.<\/li><li>Perform risk assessment and vulnerability assessment\/scanning through various scanning tools and generate detailed reports.<\/li><li>Identify the critical data and choose an appropriate backup method, media, and technique to regularly perform a successful backup of organization data.<\/li><li>Provide a first response to the network security incident and assist the IRT and forensics investigation teams in dealing with an incident.<\/li><li>Identify the Indicators of Compromise (IoC) and Indicators of Attack (IoA) on networks .<\/li><li>Integrate threat intelligence capabilities to leverage\/consume threat intelligence for proactive defense.<\/li><li>Conduct attack surface analysis by identifying Indicators of Exposures (IoE).<\/li><li>Assist in Business Continuity (BC) and Disaster Recovery (DR) planning.<\/li><li>Monitor network traffic and ensure its security .<\/li><li>Perform log management.<\/li><li>Monitor network logs against any anomalies.<\/li><li>Manage proxy and content filtering .<\/li><li>Troubleshoot the network for various network problems.<\/li><li>Identify various threats to an organization&rsquo;s network .<\/li><li>Harden security of various endpoints individually in the organization&rsquo;s network .<\/li><li>Select the appropriate firewall solution, topology, and configurations to harden security through the firewall.<\/li><li>Determine an appropriate location for IDS\/IPS sensors, tuning IDS for false positives and false negatives, and configurations to harden security through IDPS technologies<\/li><li>Maintain the inventory of computers, servers, terminals, modems, and other access devices .<\/li><li>Provide security awareness guidance and training.<\/li><li>Add, remove, or update user account information.<\/li><li>Apply operating system updates and patches and make configuration changes.<\/li><li>Update system configurations to maintain an updated security posture using current patches, device and operating system hardening techniques, and access control lists.<\/li><li>Manage network authentication, authorization, and accounting (AAA) for network devices.<\/li><li>Review audit logs from the Firewall, IDS\/IPS, servers, and hosts on the internal, protected network.<\/li><li>Analyze, troubleshoot, and investigate security-related information systems&rsquo; anomalies based on the security platform.<\/li><li>Maintain, configure, and analyze network and host-based security platforms.<\/li><li>Evaluate security products as well as security operations procedures and processes.<\/li><li>Identify and classify organizational assets, including hardware, software, data, and critical infrastructure.<\/li><li>Implement system integrity monitoring tools and techniques to identify alterations in critical files, configurations, or system states.<\/li><li>Understand the role and functionality of EDR\/XDR solutions implemented to contain and remediate threats.<\/li><li>Understand the role and functionality of UEBA solutions implemented to monitor and analyze user and entity activities for anomalous behavior patterns.<\/li><li>Conduct PIA processes to evaluate and assess the potential impact of new systems, processes, or initiatives on individual privacy.<\/li><li>Collaborate with security teams to enhance threat-hunting strategies and incident response capabilities.<\/li><li>Understand the role of Security Orchestration, Automation, and Response (SOAR) platforms in cybersecurity operations.<\/li><li>Plan and execute the integration of zero trust principles into existing security architectures and infrastructures.<\/li><li>Stay updated about the newly emerging cyber threats with the help of the latest cybersecurity news, industry publications, and reputable sources of information, including security blogs, research reports, and whitepapers.<\/li><li>Understand the role of AI\/ML in enhancing cyber defense, threat detection, and response.<\/li><\/ul>","essentials":"<p>Basic Knowledge in Networking Concepts<\/p>","audience":"<ul>\n<li>Network Administrators<\/li><li>Network Security Administrators<\/li><li>Network Engineer<\/li><li>Data Security Analyst<\/li><li>Network Security Engineer<\/li><li>Network Defense Technician<\/li><li>Security Analyst<\/li><li>Security Operator<\/li><li>Network security<\/li><li>Cybersecurity Engineer<\/li><\/ul>","contents":"<ul>\n<li>Network Attacks and Defense Strategies<\/li><li>Administrative Network Security<\/li><li>Technical Network Security<\/li><li>Network Perimeter Security<\/li><li>Endpoint Security-Windows Systems<\/li><li>Endpoint Security-Linux Systems<\/li><li>Endpoint Security- Mobile Devices<\/li><li>Endpoint Security-IoT Devices<\/li><li>Administrative Application Security<\/li><li>Data Security<\/li><li>Enterprise Virtual Network Security<\/li><li>Enterprise Cloud Network Security<\/li><li>Enterprise Wireless Network Security<\/li><li>Network Traffic Monitoring and Analysis<\/li><li>Network Logs Monitoring and Analysis<\/li><li>Incident Response and Forensic Investigation<\/li><li>Business Continuity and Disaster Recovery<\/li><li>Risk Anticipation with Risk Management<\/li><li>Threat Assessment with Attack Surface Analysis<\/li><li>Threat Prediction with Cyber Threat Intelligence<\/li><\/ul><p>APPENDIX (Self-Study)<\/p>\n<ul>\n<li>APPENDIX A: Computer Network Fundamentals<\/li><li>APPENDIX B: Physical Network Security<\/li><li>APPENDIX C: Virtual Private Network (VPN) Security<\/li><li>APPENDIX D: Endpoint Security &ndash; MAC Systems<\/li><\/ul>","summary":"<p>C|ND prepares network defenders with strategic, tactical, and operational network security capabilities, enabling them to design, develop, and maintain secure networks.<\/p>","objective_plain":"- Plan, implement, and administer network security management for an organization.\n- Gain knowledge of various security risks, threats, and vulnerabilities.\n- Assist in obtaining and maintaining an organization's compliance with required regulatory standards and frameworks.\n- Design and implement network security policies and procedures .\n- Apply security principles, protocols, and controls that suit today's distributed and mobile computing environment.\n- Apply strong Identity and Access Management (IAM), network segmentation, and encryption techniques to strengthen the organization's network.\n- Manage and maintain Windows Security Administration.\n- Manage and maintain Linux Security Administration.\n- Manage and mitigate the security risks and challenges associated with the enterprise's mobile device usage policies.\n- Manage and mitigate the security risks and challenges associated with IoT devices used in enterprises.\n- Implement strong data security techniques to secure an organization's data.\n- Implement and manage the security of virtualization technologies, i.e., Network Virtualization (NV), Software Defined Network (SDN),\n- Network Function Virtualization (NFV), OS Virtualization, Containers, Dockers, and Kubernetes used in modern-day networks.\n- Implement and manage cloud security on various cloud platforms such as AWS, Azure, Google Cloud Platform, etc.\n- Implement and manage wireless network security.\n- Perform risk assessment and vulnerability assessment\/scanning through various scanning tools and generate detailed reports.\n- Identify the critical data and choose an appropriate backup method, media, and technique to regularly perform a successful backup of organization data.\n- Provide a first response to the network security incident and assist the IRT and forensics investigation teams in dealing with an incident.\n- Identify the Indicators of Compromise (IoC) and Indicators of Attack (IoA) on networks .\n- Integrate threat intelligence capabilities to leverage\/consume threat intelligence for proactive defense.\n- Conduct attack surface analysis by identifying Indicators of Exposures (IoE).\n- Assist in Business Continuity (BC) and Disaster Recovery (DR) planning.\n- Monitor network traffic and ensure its security .\n- Perform log management.\n- Monitor network logs against any anomalies.\n- Manage proxy and content filtering .\n- Troubleshoot the network for various network problems.\n- Identify various threats to an organization\u2019s network .\n- Harden security of various endpoints individually in the organization\u2019s network .\n- Select the appropriate firewall solution, topology, and configurations to harden security through the firewall.\n- Determine an appropriate location for IDS\/IPS sensors, tuning IDS for false positives and false negatives, and configurations to harden security through IDPS technologies\n- Maintain the inventory of computers, servers, terminals, modems, and other access devices .\n- Provide security awareness guidance and training.\n- Add, remove, or update user account information.\n- Apply operating system updates and patches and make configuration changes.\n- Update system configurations to maintain an updated security posture using current patches, device and operating system hardening techniques, and access control lists.\n- Manage network authentication, authorization, and accounting (AAA) for network devices.\n- Review audit logs from the Firewall, IDS\/IPS, servers, and hosts on the internal, protected network.\n- Analyze, troubleshoot, and investigate security-related information systems\u2019 anomalies based on the security platform.\n- Maintain, configure, and analyze network and host-based security platforms.\n- Evaluate security products as well as security operations procedures and processes.\n- Identify and classify organizational assets, including hardware, software, data, and critical infrastructure.\n- Implement system integrity monitoring tools and techniques to identify alterations in critical files, configurations, or system states.\n- Understand the role and functionality of EDR\/XDR solutions implemented to contain and remediate threats.\n- Understand the role and functionality of UEBA solutions implemented to monitor and analyze user and entity activities for anomalous behavior patterns.\n- Conduct PIA processes to evaluate and assess the potential impact of new systems, processes, or initiatives on individual privacy.\n- Collaborate with security teams to enhance threat-hunting strategies and incident response capabilities.\n- Understand the role of Security Orchestration, Automation, and Response (SOAR) platforms in cybersecurity operations.\n- Plan and execute the integration of zero trust principles into existing security architectures and infrastructures.\n- Stay updated about the newly emerging cyber threats with the help of the latest cybersecurity news, industry publications, and reputable sources of information, including security blogs, research reports, and whitepapers.\n- Understand the role of AI\/ML in enhancing cyber defense, threat detection, and response.","essentials_plain":"Basic Knowledge in Networking Concepts","audience_plain":"- Network Administrators\n- Network Security Administrators\n- Network Engineer\n- Data Security Analyst\n- Network Security Engineer\n- Network Defense Technician\n- Security Analyst\n- Security Operator\n- Network security\n- Cybersecurity Engineer","contents_plain":"- Network Attacks and Defense Strategies\n- Administrative Network Security\n- Technical Network Security\n- Network Perimeter Security\n- Endpoint Security-Windows Systems\n- Endpoint Security-Linux Systems\n- Endpoint Security- Mobile Devices\n- Endpoint Security-IoT Devices\n- Administrative Application Security\n- Data Security\n- Enterprise Virtual Network Security\n- Enterprise Cloud Network Security\n- Enterprise Wireless Network Security\n- Network Traffic Monitoring and Analysis\n- Network Logs Monitoring and Analysis\n- Incident Response and Forensic Investigation\n- Business Continuity and Disaster Recovery\n- Risk Anticipation with Risk Management\n- Threat Assessment with Attack Surface Analysis\n- Threat Prediction with Cyber Threat Intelligence\nAPPENDIX (Self-Study)\n\n\n- APPENDIX A: Computer Network Fundamentals\n- APPENDIX B: Physical Network Security\n- APPENDIX C: Virtual Private Network (VPN) Security\n- APPENDIX D: Endpoint Security \u2013 MAC Systems","summary_plain":"C|ND prepares network defenders with strategic, tactical, and operational network security capabilities, enabling them to design, develop, and maintain secure networks.","skill_level":"Intermediate","version":"3","duration":{"unit":"d","value":5,"formatted":"5 jours"},"pricelist":{"List Price":{"DE":{"country":"DE","currency":"EUR","taxrate":19,"price":3950},"SI":{"country":"SI","currency":"EUR","taxrate":20,"price":3950},"UA":{"country":"UA","currency":"EUR","taxrate":20,"price":3950},"AT":{"country":"AT","currency":"EUR","taxrate":20,"price":3950},"NL":{"country":"NL","currency":"EUR","taxrate":21,"price":3950},"PL":{"country":"PL","currency":"EUR","taxrate":23,"price":3950},"IL":{"country":"IL","currency":"ILS","taxrate":17,"price":13700},"GR":{"country":"GR","currency":"EUR","taxrate":null,"price":3950},"MK":{"country":"MK","currency":"EUR","taxrate":null,"price":3950},"HU":{"country":"HU","currency":"EUR","taxrate":20,"price":3950},"CH":{"country":"CH","currency":"CHF","taxrate":8.1,"price":4790},"SE":{"country":"SE","currency":"EUR","taxrate":25,"price":3950}}},"lastchanged":"2025-12-19T15:32:42+01:00","parenturl":"https:\/\/portal.flane.ch\/swisscom\/fr\/json-courses","nexturl_course_schedule":"https:\/\/portal.flane.ch\/swisscom\/fr\/json-course-schedule\/18607","source_lang":"fr","source":"https:\/\/portal.flane.ch\/swisscom\/fr\/json-course\/ec-cnd"}}