<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="18607" language="fr" source="https://portal.flane.ch/swisscom/fr/xml-course/ec-cnd" lastchanged="2025-12-19T15:32:42+01:00" parent="https://portal.flane.ch/swisscom/fr/xml-courses"><title>EC-Council Certified Network Defender</title><productcode>CND</productcode><vendorcode>EC</vendorcode><vendorname>EC-Council</vendorname><fullproductcode>EC-CND</fullproductcode><version>3</version><objective>&lt;ul&gt;
&lt;li&gt;Plan, implement, and administer network security management for an organization.&lt;/li&gt;&lt;li&gt;Gain knowledge of various security risks, threats, and vulnerabilities.&lt;/li&gt;&lt;li&gt;Assist in obtaining and maintaining an organization&amp;#039;s compliance with required regulatory standards and frameworks.&lt;/li&gt;&lt;li&gt;Design and implement network security policies and procedures .&lt;/li&gt;&lt;li&gt;Apply security principles, protocols, and controls that suit today&amp;#039;s distributed and mobile computing environment.&lt;/li&gt;&lt;li&gt;Apply strong Identity and Access Management (IAM), network segmentation, and encryption techniques to strengthen the organization&amp;#039;s network.&lt;/li&gt;&lt;li&gt;Manage and maintain Windows Security Administration.&lt;/li&gt;&lt;li&gt;Manage and maintain Linux Security Administration.&lt;/li&gt;&lt;li&gt;Manage and mitigate the security risks and challenges associated with the enterprise&amp;#039;s mobile device usage policies.&lt;/li&gt;&lt;li&gt;Manage and mitigate the security risks and challenges associated with IoT devices used in enterprises.&lt;/li&gt;&lt;li&gt;Implement strong data security techniques to secure an organization&amp;#039;s data.&lt;/li&gt;&lt;li&gt;Implement and manage the security of virtualization technologies, i.e., Network Virtualization (NV), Software Defined Network (SDN),&lt;/li&gt;&lt;li&gt;Network Function Virtualization (NFV), OS Virtualization, Containers, Dockers, and Kubernetes used in modern-day networks.&lt;/li&gt;&lt;li&gt;Implement and manage cloud security on various cloud platforms such as AWS, Azure, Google Cloud Platform, etc.&lt;/li&gt;&lt;li&gt;Implement and manage wireless network security.&lt;/li&gt;&lt;li&gt;Perform risk assessment and vulnerability assessment/scanning through various scanning tools and generate detailed reports.&lt;/li&gt;&lt;li&gt;Identify the critical data and choose an appropriate backup method, media, and technique to regularly perform a successful backup of organization data.&lt;/li&gt;&lt;li&gt;Provide a first response to the network security incident and assist the IRT and forensics investigation teams in dealing with an incident.&lt;/li&gt;&lt;li&gt;Identify the Indicators of Compromise (IoC) and Indicators of Attack (IoA) on networks .&lt;/li&gt;&lt;li&gt;Integrate threat intelligence capabilities to leverage/consume threat intelligence for proactive defense.&lt;/li&gt;&lt;li&gt;Conduct attack surface analysis by identifying Indicators of Exposures (IoE).&lt;/li&gt;&lt;li&gt;Assist in Business Continuity (BC) and Disaster Recovery (DR) planning.&lt;/li&gt;&lt;li&gt;Monitor network traffic and ensure its security .&lt;/li&gt;&lt;li&gt;Perform log management.&lt;/li&gt;&lt;li&gt;Monitor network logs against any anomalies.&lt;/li&gt;&lt;li&gt;Manage proxy and content filtering .&lt;/li&gt;&lt;li&gt;Troubleshoot the network for various network problems.&lt;/li&gt;&lt;li&gt;Identify various threats to an organization&amp;rsquo;s network .&lt;/li&gt;&lt;li&gt;Harden security of various endpoints individually in the organization&amp;rsquo;s network .&lt;/li&gt;&lt;li&gt;Select the appropriate firewall solution, topology, and configurations to harden security through the firewall.&lt;/li&gt;&lt;li&gt;Determine an appropriate location for IDS/IPS sensors, tuning IDS for false positives and false negatives, and configurations to harden security through IDPS technologies&lt;/li&gt;&lt;li&gt;Maintain the inventory of computers, servers, terminals, modems, and other access devices .&lt;/li&gt;&lt;li&gt;Provide security awareness guidance and training.&lt;/li&gt;&lt;li&gt;Add, remove, or update user account information.&lt;/li&gt;&lt;li&gt;Apply operating system updates and patches and make configuration changes.&lt;/li&gt;&lt;li&gt;Update system configurations to maintain an updated security posture using current patches, device and operating system hardening techniques, and access control lists.&lt;/li&gt;&lt;li&gt;Manage network authentication, authorization, and accounting (AAA) for network devices.&lt;/li&gt;&lt;li&gt;Review audit logs from the Firewall, IDS/IPS, servers, and hosts on the internal, protected network.&lt;/li&gt;&lt;li&gt;Analyze, troubleshoot, and investigate security-related information systems&amp;rsquo; anomalies based on the security platform.&lt;/li&gt;&lt;li&gt;Maintain, configure, and analyze network and host-based security platforms.&lt;/li&gt;&lt;li&gt;Evaluate security products as well as security operations procedures and processes.&lt;/li&gt;&lt;li&gt;Identify and classify organizational assets, including hardware, software, data, and critical infrastructure.&lt;/li&gt;&lt;li&gt;Implement system integrity monitoring tools and techniques to identify alterations in critical files, configurations, or system states.&lt;/li&gt;&lt;li&gt;Understand the role and functionality of EDR/XDR solutions implemented to contain and remediate threats.&lt;/li&gt;&lt;li&gt;Understand the role and functionality of UEBA solutions implemented to monitor and analyze user and entity activities for anomalous behavior patterns.&lt;/li&gt;&lt;li&gt;Conduct PIA processes to evaluate and assess the potential impact of new systems, processes, or initiatives on individual privacy.&lt;/li&gt;&lt;li&gt;Collaborate with security teams to enhance threat-hunting strategies and incident response capabilities.&lt;/li&gt;&lt;li&gt;Understand the role of Security Orchestration, Automation, and Response (SOAR) platforms in cybersecurity operations.&lt;/li&gt;&lt;li&gt;Plan and execute the integration of zero trust principles into existing security architectures and infrastructures.&lt;/li&gt;&lt;li&gt;Stay updated about the newly emerging cyber threats with the help of the latest cybersecurity news, industry publications, and reputable sources of information, including security blogs, research reports, and whitepapers.&lt;/li&gt;&lt;li&gt;Understand the role of AI/ML in enhancing cyber defense, threat detection, and response.&lt;/li&gt;&lt;/ul&gt;</objective><essentials>&lt;p&gt;Basic Knowledge in Networking Concepts&lt;/p&gt;</essentials><audience>&lt;ul&gt;
&lt;li&gt;Network Administrators&lt;/li&gt;&lt;li&gt;Network Security Administrators&lt;/li&gt;&lt;li&gt;Network Engineer&lt;/li&gt;&lt;li&gt;Data Security Analyst&lt;/li&gt;&lt;li&gt;Network Security Engineer&lt;/li&gt;&lt;li&gt;Network Defense Technician&lt;/li&gt;&lt;li&gt;Security Analyst&lt;/li&gt;&lt;li&gt;Security Operator&lt;/li&gt;&lt;li&gt;Network security&lt;/li&gt;&lt;li&gt;Cybersecurity Engineer&lt;/li&gt;&lt;/ul&gt;</audience><contents>&lt;ul&gt;
&lt;li&gt;Network Attacks and Defense Strategies&lt;/li&gt;&lt;li&gt;Administrative Network Security&lt;/li&gt;&lt;li&gt;Technical Network Security&lt;/li&gt;&lt;li&gt;Network Perimeter Security&lt;/li&gt;&lt;li&gt;Endpoint Security-Windows Systems&lt;/li&gt;&lt;li&gt;Endpoint Security-Linux Systems&lt;/li&gt;&lt;li&gt;Endpoint Security- Mobile Devices&lt;/li&gt;&lt;li&gt;Endpoint Security-IoT Devices&lt;/li&gt;&lt;li&gt;Administrative Application Security&lt;/li&gt;&lt;li&gt;Data Security&lt;/li&gt;&lt;li&gt;Enterprise Virtual Network Security&lt;/li&gt;&lt;li&gt;Enterprise Cloud Network Security&lt;/li&gt;&lt;li&gt;Enterprise Wireless Network Security&lt;/li&gt;&lt;li&gt;Network Traffic Monitoring and Analysis&lt;/li&gt;&lt;li&gt;Network Logs Monitoring and Analysis&lt;/li&gt;&lt;li&gt;Incident Response and Forensic Investigation&lt;/li&gt;&lt;li&gt;Business Continuity and Disaster Recovery&lt;/li&gt;&lt;li&gt;Risk Anticipation with Risk Management&lt;/li&gt;&lt;li&gt;Threat Assessment with Attack Surface Analysis&lt;/li&gt;&lt;li&gt;Threat Prediction with Cyber Threat Intelligence&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;APPENDIX (Self-Study)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;APPENDIX A: Computer Network Fundamentals&lt;/li&gt;&lt;li&gt;APPENDIX B: Physical Network Security&lt;/li&gt;&lt;li&gt;APPENDIX C: Virtual Private Network (VPN) Security&lt;/li&gt;&lt;li&gt;APPENDIX D: Endpoint Security &amp;ndash; MAC Systems&lt;/li&gt;&lt;/ul&gt;</contents><objective_plain>- Plan, implement, and administer network security management for an organization.
- Gain knowledge of various security risks, threats, and vulnerabilities.
- Assist in obtaining and maintaining an organization's compliance with required regulatory standards and frameworks.
- Design and implement network security policies and procedures .
- Apply security principles, protocols, and controls that suit today's distributed and mobile computing environment.
- Apply strong Identity and Access Management (IAM), network segmentation, and encryption techniques to strengthen the organization's network.
- Manage and maintain Windows Security Administration.
- Manage and maintain Linux Security Administration.
- Manage and mitigate the security risks and challenges associated with the enterprise's mobile device usage policies.
- Manage and mitigate the security risks and challenges associated with IoT devices used in enterprises.
- Implement strong data security techniques to secure an organization's data.
- Implement and manage the security of virtualization technologies, i.e., Network Virtualization (NV), Software Defined Network (SDN),
- Network Function Virtualization (NFV), OS Virtualization, Containers, Dockers, and Kubernetes used in modern-day networks.
- Implement and manage cloud security on various cloud platforms such as AWS, Azure, Google Cloud Platform, etc.
- Implement and manage wireless network security.
- Perform risk assessment and vulnerability assessment/scanning through various scanning tools and generate detailed reports.
- Identify the critical data and choose an appropriate backup method, media, and technique to regularly perform a successful backup of organization data.
- Provide a first response to the network security incident and assist the IRT and forensics investigation teams in dealing with an incident.
- Identify the Indicators of Compromise (IoC) and Indicators of Attack (IoA) on networks .
- Integrate threat intelligence capabilities to leverage/consume threat intelligence for proactive defense.
- Conduct attack surface analysis by identifying Indicators of Exposures (IoE).
- Assist in Business Continuity (BC) and Disaster Recovery (DR) planning.
- Monitor network traffic and ensure its security .
- Perform log management.
- Monitor network logs against any anomalies.
- Manage proxy and content filtering .
- Troubleshoot the network for various network problems.
- Identify various threats to an organization’s network .
- Harden security of various endpoints individually in the organization’s network .
- Select the appropriate firewall solution, topology, and configurations to harden security through the firewall.
- Determine an appropriate location for IDS/IPS sensors, tuning IDS for false positives and false negatives, and configurations to harden security through IDPS technologies
- Maintain the inventory of computers, servers, terminals, modems, and other access devices .
- Provide security awareness guidance and training.
- Add, remove, or update user account information.
- Apply operating system updates and patches and make configuration changes.
- Update system configurations to maintain an updated security posture using current patches, device and operating system hardening techniques, and access control lists.
- Manage network authentication, authorization, and accounting (AAA) for network devices.
- Review audit logs from the Firewall, IDS/IPS, servers, and hosts on the internal, protected network.
- Analyze, troubleshoot, and investigate security-related information systems’ anomalies based on the security platform.
- Maintain, configure, and analyze network and host-based security platforms.
- Evaluate security products as well as security operations procedures and processes.
- Identify and classify organizational assets, including hardware, software, data, and critical infrastructure.
- Implement system integrity monitoring tools and techniques to identify alterations in critical files, configurations, or system states.
- Understand the role and functionality of EDR/XDR solutions implemented to contain and remediate threats.
- Understand the role and functionality of UEBA solutions implemented to monitor and analyze user and entity activities for anomalous behavior patterns.
- Conduct PIA processes to evaluate and assess the potential impact of new systems, processes, or initiatives on individual privacy.
- Collaborate with security teams to enhance threat-hunting strategies and incident response capabilities.
- Understand the role of Security Orchestration, Automation, and Response (SOAR) platforms in cybersecurity operations.
- Plan and execute the integration of zero trust principles into existing security architectures and infrastructures.
- Stay updated about the newly emerging cyber threats with the help of the latest cybersecurity news, industry publications, and reputable sources of information, including security blogs, research reports, and whitepapers.
- Understand the role of AI/ML in enhancing cyber defense, threat detection, and response.</objective_plain><essentials_plain>Basic Knowledge in Networking Concepts</essentials_plain><audience_plain>- Network Administrators
- Network Security Administrators
- Network Engineer
- Data Security Analyst
- Network Security Engineer
- Network Defense Technician
- Security Analyst
- Security Operator
- Network security
- Cybersecurity Engineer</audience_plain><contents_plain>- Network Attacks and Defense Strategies
- Administrative Network Security
- Technical Network Security
- Network Perimeter Security
- Endpoint Security-Windows Systems
- Endpoint Security-Linux Systems
- Endpoint Security- Mobile Devices
- Endpoint Security-IoT Devices
- Administrative Application Security
- Data Security
- Enterprise Virtual Network Security
- Enterprise Cloud Network Security
- Enterprise Wireless Network Security
- Network Traffic Monitoring and Analysis
- Network Logs Monitoring and Analysis
- Incident Response and Forensic Investigation
- Business Continuity and Disaster Recovery
- Risk Anticipation with Risk Management
- Threat Assessment with Attack Surface Analysis
- Threat Prediction with Cyber Threat Intelligence
APPENDIX (Self-Study)


- APPENDIX A: Computer Network Fundamentals
- APPENDIX B: Physical Network Security
- APPENDIX C: Virtual Private Network (VPN) Security
- APPENDIX D: Endpoint Security – MAC Systems</contents_plain><duration unit="d" days="5">5 jours</duration><pricelist><price country="DE" currency="EUR">3950.00</price><price country="SI" currency="EUR">3950.00</price><price country="UA" currency="EUR">3950.00</price><price country="AT" currency="EUR">3950.00</price><price country="NL" currency="EUR">3950.00</price><price country="PL" currency="EUR">3950.00</price><price country="IL" currency="ILS">13700.00</price><price country="GR" currency="EUR">3950.00</price><price country="MK" currency="EUR">3950.00</price><price country="HU" currency="EUR">3950.00</price><price country="CH" currency="CHF">4790.00</price><price country="SE" currency="EUR">3950.00</price></pricelist><miles/></course>