Overview

This instructor led, online training course, provides students with all the knowledge to identify what parts of an organization need to be reviewed and tested for security vulnerabilities and how to reduce, prevent, and mitigate risks in the network. Network Defender covers the protect, detect, respond and predict approach to network security.

Exam – 312-38 (CND)

COURSE INSTRUCTOR: Shane Sexton, CompTIA, Cybersecurity, Cisco, Citrix
COURSE DIFFICULTY: Intermediate
COURSE DURATION: 12h

After completing this online training course, students will be able to:

  • Describe Network and Security concepts

  • Better understand threats, attacks, and vulnerabilities

  • Implement Security policies

  • Set up Disaster Recovery

  • Better understand basics and capabilities of Firewalls

  • Utilize Intrusion Detection (IDS) and Intrusion Prevention (IPS)

  • Utilize VPNs and understand their protocols and topologies

  • Better understand of physical Security

  • Better understanding of Wireless threats and how to defend against them

  • Utilize Wireshark and other Network monitoring technologies

  • How to perform structured Incident Response

  • System administrators
  • System engineers
  • Firewall administrators
  • Network managers
  • IT managers

None, but we recommend CompTIA Security+ or equivalent knowledge.

01. Introduction
  • Network and Security Concepts
  • Network Topologies
  • IP Addressing
02. Threats, Attacks, and Vulnerabilities
  • Understanding Threats, Attacks, and Vulnerabilities
  • Common Malware and Attacks
03. Authentication, Authorization, and Accounting
  • Introduction to AAA and Access Control Models
  • Data Encryption
  • Public Key Infrastructure (PKI)
04. Security Policies
  • Policies, Regulations, and Frameworks
  • Implementing Security Policies
  • Example Policies
  • Disaster Recovery and Business Continuity
05. Firewalls
  • Firewall Basics
  • Firewall Capabilities
  • Firewall Selection
  • Firewall Deployment
  • SDP and Zero Trust
06. Intrusion Detection (IDS) and Prevention
  • How IDS and IPS Work
  • Network and Host-based IDPS
07. Host Security
  • Host Security Basics
  • Windows Security
  • Linux Security
  • IoT Security
  • Antimalware
  • Network and Virtualization Security
08. VPNs
  • VPN Basics
  • VPN Protocols
  • VPN Topologies
  • VPN Selection
09. Physical Security
  • Physical Security Basics
  • Physical Controls
  • Technical Controls
10. Wireless Security
  • Wireless Topologies
  • Wireless Technologies
  • Wireless Threats and Defenses
11. Network Monitoring
  • Monitoring Technologies
  • Wireshark
  • Detecting Attacks with Wireshark
  • Log Collection and SIEMs
12. Risk Management
  • Key Risk Management Concepts
  • Risk Management Strategies
  • Risk and Vulnerability Management
  • Attack Surface Visualization
  • Risk Management Phases
13. Backups
  • Storage Technologies
  • Backup Solutions
14. Incident Response
  • Incident Response Plans
  • Incident Response Phases
15. Cloud Security