Select Page

C|ND Cyber Defense Expert Specialty in Network Defense

The Program CND Certified Network Defender v2 is the most practical on the market, with labs, best practices, tools, protection technologies, policy templates, and documentation. As a Network Administrator you will be the first line of defense in designing a secure network. that guarantees the stability of the company. Learn protocols and devices to identify threats, false positives and negatives, implement policies, host security, network monitoring, data transfer construction, network or software technologies, and analyze the parties involved to prevent, detect, and respond to attacks using security devices and firewalls.

C|ND

 

SUBSIDIZED FOR WORKERS

REQUEST MORE INFORMATION

     

    Program aligned with the Department of Defense (DoD) and American National Standards Institute (ANSI) accreditations for Systems/Network Administrators, with the global job roles and responsibilities established by the NICE (National Initiative for Cybersecurity Education) Framework 2.0.


    Designed by industry experts to assist IT professionals in preventing and protecting digital business assets and detecting and responding to cyber threats, within the framework of cybersecurity education and job role task analysis presented by the National Infocomm Competency Framework (NICF).

     

      Demo Video
      Infórmate Infórmate

      Syllabus

      C|ND

          • Network attacks and defense strategies.
          • Administrative network security.
          • Technical network security.
          • Network perimeter security.
          • Endpoint Security on Windows systems.
          • Endpoint Security on Linux systems.
          • Endpoint Security on mobile devices.
          • Endpoint Security on IoT devices.
          • Security of administrative applications.
          • Data security.
          • Enterprise virtual network security.
          • Enterprise network security in the cloud.
          • Enterprise Wireless Network Security.
          • Network traffic monitoring and analysis.
          • Network log monitoring and analysis.
          • Incident response and forensic investigation.
          • Business continuity and disaster recovery plan.
          • Risk anticipation with risk management.
          • Threat Assessment with Attack Surface Analysis.
          • Threat prediction with Cyber Threat Intelligence.

      Official Certification

        • Final Project.
        • Official Certification Masterclass.