Search courses 👉
Professional Training

Network Defense Essentials (NDE)

edX, Online
Length
1 week
Next course start
Start anytime See details
Course delivery
Self-Paced Online
Length
1 week
Next course start
Start anytime See details
Course delivery
Self-Paced Online
Visit this course's homepage on the provider's site to learn more or book!

Course description

Network Defense Essentials (NDE)

Network security plays a vital role in most organizations. It is the process of preventing and detecting unauthorized use of an organization’s networking infrastructure. Network Defense Essentials (NDE) is a security program covering the fundamental concepts of network security. It equips students with the skills required to identify the increasing network security threats that reflect on the organization's security posture and implement general security controls to protect the underlying networking infrastructure from unauthorized access, modification, destruction, or disclosure.

This program will give a holistic overview of the key components of network security. It provides a solid fundamental knowledge required for a career in network security.

Why is NDE Important?

  • It facilitates your entry into the world of network security
  • It provides a professional understanding of the concepts of network security
  • It provides best practices to improve organizational security posture
  • It enhances your skills as a Network Security Specialist and increases your employability

Upcoming start dates

1 start date available

Start anytime

  • Self-Paced Online
  • Online
  • English

Suitability - Who should attend?

Prerequisites

This program is ideal for IT professionals who are seeking to foray into the exciting world of cybersecurity. Cybersecurity enthusiasts and students will readily find the program interesting, challenging, and useful.

Outcome / Qualification etc.

What you'll learn

Students going through NDE training will learn:

  • Key issues plaguing the network security
  • Essential network security protocols
  • Identification, authentication, and authorization concepts
  • Administrative security controls (Frameworks, laws, acts, and security policies)
  • Physical security controls (Physical security controls, workplace security, and environmental controls)
  • Technical security controls (Network segmentation, firewall, IDS/IPS, honeypot, proxy server, VPN, SIEM, UBA, and anti-malware)
  • Fundamentals of virtualization, cloud computing, and cloud security
  • Wireless network fundamentals, wireless encryption, and security measures
  • Fundamentals of mobile and IoT devices and their security measures
  • Cryptography and PKI Concepts
  • Data security, data encryption, and data backup and data loss prevention techniques
  • Network traffic monitoring for suspicious traffic

Training Course Content

Network Security Fundamentals

This module provides insight into the network security fundamentals, such as network defense approaches, network security controls, network security protocols, etc.

Identification, Authentication, and Authorization

This module provides an overview of various methods and techniques used for the identification, authentication, and authorization of users accessing critical assets and resources.

Network Security Controls - Administrative Controls

This module addresses an administrative aspect of an organization’s network security.

Network Security Controls - Physical Controls

This module explains the importance of physical security, various physical security controls, importance of workplace security, and various environmental controls.

Network Security Controls - Technical Controls

This module provides an overview of various technical controls that help organizations in protecting their private networks and IT assets.

Virtualization and Cloud Computing

This module provides an overview of virtualization and cloud computing concepts that help organizations securely store or process data on the cloud.

Wireless Network Security

This module deals with network security for wireless networks in enterprises.

Mobile Device Security

This module provides an overview of mobile device security risks and best practices for mobile platforms.

IoT Device Security

The use of Internet of Things (IoT) devices in enterprise IT infrastructure has created a vast security perimeter. Attackers can easily compromise IoT endpoints. Understanding the security measures will help in securing IoT-enabled environments. This module provides an overview of IoT device security.

Cryptography and PKI

This module provides a comprehensive understanding of different cryptosystems and algorithms, one-way hash functions, and public key infrastructures (PKIs). It also covers various tools used to encrypt sensitive data.

Data Security

This module explains the importance of data and various techniques to protect data.

Network Traffic Monitoring

Organizations need to perform network monitoring and analyze network traffic to identify suspicious activities across their networks. This module covers the concept of network traffic monitoring.

Course delivery details

This course is offered through EC-Council, a partner institute of EdX.

16-24 hours per week

Expenses

  • Verified Track -$99
  • Audit Track - Free
Ads