EC-Council CND: Certified Network Defender v2

The EC-Council CND course offers comprehensive training on safeguarding network assets from attacks. It equips professionals with best practices in threat detection, incident response, and the development of threat intelligence systems, enabling them to predict and prevent future threats effectively.
Course Details

Price:

$3,695.00

Days:

1

Location:

Virtual

Course Overview

The EC-Council CND course offers comprehensive training on safeguarding network assets from attacks. It equips professionals with best practices in threat detection, incident response, and the development of threat intelligence systems, enabling them to predict and prevent future threats effectively.

– • Understanding network security management
– • Establishing network security policies and procedures
– • Windows and Linux security administration
– • Setting up mobile and IoT device security
– • Implementing data security techniques on networks
– • Embedding virtualization technology security
– • Determining cloud and wireless security
– • Deploying and using risk assessment tools
– • Learning basics of first response and forensics
– • Understanding indicators of Compromise, Attack, and Exposures (IoC, IoA, IoE)
– • Building threat intelligence capabilities
– • Establishing and monitoring log management
– • Implementing endpoint security
– • Configuring optimum firewall solutions
– • Understanding and using IDS/IPS technologies
– • Establishing Network Authentication, Authorization, Accounting (AAA)

• The candidate must have at least 2 years of work experience in the Information Security domain.

• Incident Response and Forensic Investigation
• Incident Response and Forensic Investigation
• Incident Response and Forensic Investigation
• Incident Response and Forensic Investigation
• Business Continuity and Disaster Recovery
• Business Continuity and Disaster Recovery
• Business Continuity and Disaster Recovery
• Business Continuity and Disaster Recovery
• Network Logs Monitoring and Analysis
• Network Logs Monitoring and Analysis
• Network Logs Monitoring and Analysis
• Network Logs Monitoring and Analysis
• Network Traffic Monitoring and Analysis
• Network Traffic Monitoring and Analysis
• Network Traffic Monitoring and Analysis
• Network Traffic Monitoring and Analysis
• Enterprise Virtual Network Security
• Enterprise Virtual Network Security
• Enterprise Virtual Network Security
• Enterprise Virtual Network Security
• Data Security
• Data Security
• Data Security
• Data Security
• Enterprise Wireless Network Security
• Enterprise Wireless Network Security
• Enterprise Wireless Network Security
• Enterprise Wireless Network Security
• Enterprise Cloud Network Security
• Enterprise Cloud Network Security
• Enterprise Cloud Network Security
• Enterprise Cloud Network Security
• Threat Prediction with Cyber Threat Intelligence
• Threat Prediction with Cyber Threat Intelligence
• Threat Prediction with Cyber Threat Intelligence
• Threat Prediction with Cyber Threat Intelligence
• Risk Anticipation with Risk Management
• Risk Anticipation with Risk Management
• Risk Anticipation with Risk Management
• Risk Anticipation with Risk Management
• Threat Assessment with Attack Surface Analysis
• Threat Assessment with Attack Surface Analysis
• Threat Assessment with Attack Surface Analysis
• Threat Assessment with Attack Surface Analysis
• Network Attacks and Defense Strategies
• Network Attacks and Defense Strategies
• Network Attacks and Defense Strategies
• Network Attacks and Defense Strategies
• Administrative Network Security
• Administrative Network Security
• Administrative Network Security
• Administrative Network Security
• Technical Network Security
• Technical Network Security
• Technical Network Security
• Technical Network Security
• Network Perimeter Security
• Network Perimeter Security
• Network Perimeter Security
• Network Perimeter Security
• Administrative Application Security
• Administrative Application Security
• Administrative Application Security
• Administrative Application Security
• Endpoint Security – Mobile Devices
• Endpoint Security – Mobile Devices
• Endpoint Security – Mobile Devices
• Endpoint Security – Mobile Devices
• Endpoint Security – IoT Devices
• Endpoint Security – IoT Devices
• Endpoint Security – IoT Devices
• Endpoint Security – IoT Devices
• Endpoint Security – Windows Systems
• Endpoint Security – Windows Systems
• Endpoint Security – Windows Systems
• Endpoint Security – Windows Systems
• Endpoint Security – Linux Systems
• Endpoint Security – Linux Systems
• Endpoint Security – Linux Systems
• Endpoint Security – Linux Systems

Class Dates & Times
Filters Sort results
Reset Apply
6/9/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$3,695.00
7/7/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$3,695.00
8/4/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$3,695.00
9/8/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$3,695.00
10/6/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$3,695.00
11/3/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$3,695.00
12/1/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$3,695.00
— Questions?

Information Request

— Empower Change

Invest in Skills & Equality

Support Diversity, Equity, and Inclusion with Every Purchase.

Great Horizons is a North Carolina Certified HUB Vendor and WOSB. By becoming a patron of our organization, you are not only supporting a historically underutilized business, but a woman-owned small business as well.