CND – CERTIFIED NETWORK DEFENDER
Slider
logo_eccouncil

CND Certified Network Defender

Objetivo

O curso cobre as três abordagens: preventiva, reativa e retrospectiva da segurança de redes.

Após a realização desse curso, você será capaz de:

  • Projetar e implementar as políticas e procedimentos de segurança de rede.
  • Determinar e implementar controles de segurança física para as organizações.
  • Implementar VPN segura para as organizações, identificar ameaças à rede sem fio e mitigá-los.
  • Realizar avaliação de riscos e avaliação de vulnerabilidade através de várias ferramentas de verificação e gerar relatórios detalhados sobre ele.
  • Proteger a rede de entidades maliciosas, monitorar o tráfego de rede e garantir a segurança do tráfego de rede.
    Garantir a segurança física de equipamentos de rede.
  • Projetar e implementar uma rede baseada em Intrusão detecção / prevenção de Sistemas (IDS / IPS) e Sistemas de Intrusão / Prevenção de detecção baseado em host (HIDS / HIPS) Gerir Proxy e filtragem de conteúdo.
  • Projetar e implementar um firewall.
  • Criar e implementar processos de resposta a incidentes.

Carga Horária: 40 horas 

Pré-requisito

Sólidos conhecimentos em conceitos de redes.

Administradores de rede, engenheiros de rede, analistas de segurança, enfim, todos os profissionais que atuam ou pretendem atuar na área de redes.

Público-alvo

Conteúdo

Módulo 1: Computer Network and Defense Fundamentals

Network Fundamentals.
Network Components.
TCP/IP Networking Basics.
TCP/IP Protocol Stack.
IP Addressing.
Computer Network Defense (CND).
CND Triad.
CND Process.
CND Actions.
CND Approaches.

Módulo 2: Network Security Threats, Vulnerabilities, and Attacks

Essential Terminologies.
Network Security Concerns.
Network Security Vulnerabilities.
Network Reconnaissance Attacks.
Network Access Attacks.
Denial of Service (DoS) Attacks.
Distributed Denial-of-Service Attack (DDoS).
Malware Attacks.

Módulo 3: Network Security Controls, Protocols, and Devices

Fundamental Elements of Network Security.
Network Security Controls.
User Identification, Authentication, Authorization and Accounting.
Types of Authorization Systems.
Authorization Principles.
Cryptography.
Security Policy.
Network Security Devices.
Network Security Protocols.

Módulo 4: Network Security Policy Design and Implementation

What is Security Policy?
Internet Access Policies.
Acceptable-Use Policy.
User-Account Policy.
Remote-Access Policy.
Information-Protection Policy.
Firewall-Management Policy.
Special-Access Policy.
Network-Connection Policy.
Business-Partner Policy.
Email Security Policy.
Passwords Policy.
Physical Security Policy.
Information System Security Policy.
Bring Your Own Devices (BYOD) Policy.
Software/Application Security Policy.
Data Backup Policy.
Confidential Data Policy.
Data Classification Policy.
Internet Usage Policies.
Server Policy.
Wireless Network Policy.
Incidence Response Plan (IRP).
User Access Control Policy.
Switch Security Policy.
Intrusion Detection and Prevention (IDS/IPS) Policy.
Personal Device Usage Policy.
Encryption Policy.
Router Policy.
Security Policy Training and Awareness.
ISO Information Security Standards.

Módulo 5: Physical Security

Physical Security.
Access Control Authentication Techniques.
Physical Security Controls.
Other Physical Security Measures.
Workplace Security.
Personnel Security: Managing Staff Hiring and Leaving Process.
Laptop Security Tool.
Environmental Controls.
Physical Security: Awareness /Training.
Physical Security Checklists.

Módulo 6: Host Security

Host Security.
OS Security.
Linux Security.
Securing Network Servers.
Hardening Routers and Switches.
Application/software Security.
Data Security.
Virtualization Security.

Módulo 7: Secure Firewall Configuration and Management

Firewalls and Concerns.
What Firewalls Does?
What should you not Ignore?: Firewall Limitations.
How Does a Firewall Work?
Firewall Rules.
Types of Firewalls.
Firewall Technologies.
Firewall Topologies.
Firewall Rule Set & Policies.
Firewall Implementation.
Firewall Administration.
Firewall Logging and Auditing.
Firewall Anti-evasion Techniques.
Why Firewalls are Bypassed?
Full Data Traffic Normalization.
Data Stream-based Inspection.
Vulnerability-based Detection and Blocking.
Firewall Security Recommendations and Best Practices.
Firewall Security Auditing Tools.

Módulo 8: Secure Ids Configuration and Management

Intrusions and IDPS.
IDS.
Types of IDS Implementation.
IDS Deployment Strategies.
Types of IDS Alerts.
IDS mistakes that should be avoided.
IPS.
IDPS Product Selection Considerations.
IDS Counterparts.

Módulo 9: Secure Vpn Configuration and Management

Understanding Virtual Private Network (VPN).
How VPN works?
Why to Establish VPN ?
VPN Components.
VPN Concentrators.
Types of VPN.
VPN Categories.
Selecting Appropriate VPN.
VPN Core Functions.
VPN Technologies.
VPN Topologies.
Common VPN Flaws.
VPN Security.
Quality Of Service and Performance in VPNs.

Módulo 10: Wireless Network Defense

Wireless Terminologies.
Wireless Networks.
Wireless Standard.
Wireless Topologies.
Typical Use of Wireless Networks.
Components of Wireless Network.
WEP (Wired Equivalent Privacy) Encryption.
WPA (Wi-Fi Protected Access) Encryption.
WPA2 Encryption.
WEP vs. WPA vs. WPA2.
Wi-Fi Authentication Method.
Wi-Fi Authentication Process Using a Centralized Authentication Server.
Wireless Network Threats.
Bluetooth Threats.
Wireless Network Security.
Wi-Fi Discovery Tools.
Locating Rogue Access points.
Protecting from Denial-of-Service Attacks: Interference.
Assessing Wireless Network Security.
Wi-Fi Security Auditing Tool: AirMagnet WiFi Analyzer.
WPA Security Assessment Tool.
Wi-Fi Vulnerability Scanning Tools.
Deploying Wireless IDS (WIDS) and Wireless IPS (WIPS).
WIPS Tool.
Configuring Security on Wireless Routers.
Additional Wireless Network Security Guidelines.

Módulo 11: Network Traffic Monitoring and Analysis

Network Traffic Monitoring and Analysis (Introduction).
Network Monitoring: Positioning your Machine at Appropriate Location.
Network Traffic Signatures.
Packet Sniffer: Wireshark.
Detecting OS Fingerprinting Attempts.
Detecting PING Sweep Attempt.
Detecting ARP Sweep/ ARP Scan Attempt.
Detecting TCP Scan Attempt.
Detecting SYN/FIN DDOS Attempt.
Detecting UDP Scan Attempt.
Detecting Password Cracking Attempts.
Detecting FTP Password Cracking Attempts.
Detecting Sniffing (MITM) Attempts.
Detecting the Mac Flooding Attempt.
Detecting the ARP Poisoning Attempt.
Additional Packet Sniffing Tools.
Network Monitoring and Analysis.
Bandwidth Monitoring.

Módulo 12: Network Risk and Vulnerability Management

What is Risk?
Risk Levels.
Risk Matrix.
Key Risk Indicators (KRI).
Risk Management Phase.
Enterprise Network Risk Management.
Vulnerability Management.
Reporting.
Remediation.
Verification.

Módulo 13: Data Backup and Recovery

Introduction to Data Backup.
RAID (Redundant Array Of Independent Disks) Technology.
Storage Area Network (SAN).
Network Attached Storage (NAS).
Selecting Appropriate Backup Method.
Choosing the Right Location for Backup.
Backup Types.
Conducting Recovery Drill Test.
Data Recovery.
Windows Data Recovery Tool.
RAID Data Recovery Services.
SAN Data Recovery Software.
NAS Data Recovery Services.

Módulo 14: Network Incident Response and Management

Incident Handling and Response.
Incident Response Team Members: Roles and Responsibilities.
First Responder.
Incident Handling and Response Process.
Overview of IH&R Process Flow.

Atendimento Personalizado

Para saber mais sobre os treinamentos, certificações e soluções de TI da SoftSell, entre em contato com a gente.
É só escolher o seu canal preferido e aguardar breve resposta em horário comercial:

Curitiba: 41 3204.1999
Demais localidades: 4007.2186
WhatsApp : 41 98754.3534
Email: [email protected]
 

ENDEREÇO
Rua Emiliano Perneta, 680 – 9º Andar
Centro – Curitiba – Paraná – 80420-080