CND – CERTIFIED NETWORK DEFENDER
Treinamento e Certificações

Treinamentos e Certificações
de valor para sua carreira

Treinamentos e Certificações
de valor para sua carreira

Treinamento e Certificações
Slider
logo_eccouncil

CND
CERTIFIED NETWORK DEFENDER

Objetivo

O curso cobre as três abordagens: preventiva, reativa e retrospectiva da segurança de redes.

Após a realização desse curso, você será capaz de:

  • Projetar e implementar as políticas e procedimentos de segurança de rede
  • Determinar e implementar controles de segurança física para as organizações
  • Implementar VPN segura para as organizações, identificar ameaças à rede sem fio e mitigá-los
  • Realizar avaliação de riscos e avaliação de vulnerabilidade através de várias ferramentas de verificação e gerar relatórios detalhados sobre ele
  • Proteger a rede de entidades maliciosas, monitorar o tráfego de rede e garantir a segurança do tráfego de rede
  • Garantir a segurança física de equipamentos de rede
  • Projetar e implementar uma rede baseada em Intrusão detecção / prevenção de Sistemas (IDS / IPS) e Sistemas de Intrusão / Prevenção de detecção baseado em host (HIDS / HIPS) Gerir Proxy e filtragem de conteúdo
  • Projetar e implementar um firewall
  • Criar e implementar processos de resposta a incidentes

 

Carga Horária: 40 horas / aula

Pré-requisitos

Sólidos conhecimentos em conceitos de redes.

Administradores de rede, engenheiros de rede, analistas de segurança, enfim, todos os profissionais que atuam ou pretendem atuar na área de redes.

Público-alvo

Conteúdo

  • MODULE 01: COMPUTER NETWORK AND DEFENSE FUNDAMENTALS

    • Network Fundamentals
    • Network Components
    • TCP/IP Networking Basics
    • TCP/IP Protocol Stack
    • IP Addressing
    • Computer Network Defense (CND)
    • CND Triad
    • CND Process
    • CND Actions
    • CND Approaches
     

    MODULE 02: NETWORK SECURITY THREATS, VULNERABILITIES, AND ATTACKS

    • Essential Terminologies
    • Network Security Concerns
    • Network Security Vulnerabilities
    • Network Reconnaissance Attacks
    • Network Access Attacks
    • Denial of Service (DoS) Attacks
    • Distributed Denial-of-Service Attack (DDoS)
    • Malware Attacks
     

    MODULE 03: NETWORK SECURITY CONTROLS, PROTOCOLS, AND DEVICES

    • Fundamental Elements of Network Security
    • Network Security Controls
    • User Identification, Authentication, Authorization and Accounting
    • Types of Authorization Systems
    • Authorization Principles
    • Cryptography
    • Security Policy
    • Network Security Devices
    • Network Security Protocols
     

    MODULE 04: NETWORK SECURITY POLICY DESIGN AND IMPLEMENTATION

    • What is Security Policy?
    • Internet Access Policies
    • Acceptable-Use Policy
    • User-Account Policy
    • Remote-Access Policy
    • Information-Protection Policy
    • Firewall-Management Policy
    • Special-Access Policy
    • Network-Connection Policy
    • Business-Partner Policy
    • Email Security Policy
    • Passwords Policy
    • Physical Security Policy
    • Information System Security Policy
    • Bring Your Own Devices (BYOD) Policy
    • Software/Application Security Policy
    • Data Backup Policy
    • Confidential Data Policy
    • Data Classification Policy
    • Internet Usage Policies
    • Server Policy
    • Wireless Network Policy
    • Incidence Response Plan (IRP)
    • User Access Control Policy
    • Switch Security Policy
    • Intrusion Detection and Prevention (IDS/IPS) Policy
    • Personal Device Usage Policy
    • Encryption Policy
    • Router Policy
    • Security Policy Training and Awareness
    • ISO Information Security Standards
     

    MODULE 05: PHYSICAL SECURITY

    • Physical Security
    • Access Control Authentication Techniques
    • Physical Security Controls
    • Other Physical Security Measures
    • Workplace Security
    • Personnel Security: Managing Staff Hiring and Leaving Process
    • Laptop Security Tool
    • Environmental Controls
    • Physical Security: Awareness /Training
    • Physical Security Checklists
     

    MODULE 06: HOST SECURITY

    • Host Security
    • OS Security
    • Linux Security
    • Securing Network Servers
    • Hardening Routers and Switches
    • Application/software Security
    • Data Security
    • Virtualization Security
     

    MODULE 07: SECURE FIREWALL CONFIGURATION AND MANAGEMENT

    • Firewalls and Concerns
    • What Firewalls Does?
    • What should you not Ignore?: Firewall Limitations
    • How Does a Firewall Work?
    • Firewall Rules
    • Types of Firewalls
    • Firewall Technologies
    • Firewall Topologies
    • Firewall Rule Set & Policies
    • Firewall Implementation
    • Firewall Administration
    • Firewall Logging and Auditing
    • Firewall Anti-evasion Techniques
    • Why Firewalls are Bypassed?
    • Full Data Traffic Normalization
    • Data Stream-based Inspection
    • Vulnerability-based Detection and Blocking
    • Firewall Security Recommendations and Best Practices
    • Firewall Security Auditing Tools
     

    MODULE 08: SECURE IDS CONFIGURATION AND MANAGEMENT

    • Intrusions and IDPS
    • IDS
    • Types of IDS Implementation
    • IDS Deployment Strategies
    • Types of IDS Alerts
    • IDS mistakes that should be avoided
    • IPS
    • IDPS Product Selection Considerations
    • IDS Counterparts
     

    MODULE 09: SECURE VPN CONFIGURATION AND MANAGEMENT

    • Understanding Virtual Private Network (VPN)
    • How VPN works?
    • Why to Establish VPN ?
    • VPN Components
    • VPN Concentrators
    • Types of VPN
    • VPN Categories
    • Selecting Appropriate VPN
    • VPN Core Functions
    • VPN Technologies
    • VPN Topologies
    • Common VPN Flaws
    • VPN Security
    • Quality Of Service and Performance in VPNs
     

    MODULE 10: WIRELESS NETWORK DEFENSE

    • Wireless Terminologies
    • Wireless Networks
    • Wireless Standard
    • Wireless Topologies
    • Typical Use of Wireless Networks
    • Components of Wireless Network
    • WEP (Wired Equivalent Privacy) Encryption
    • WPA (Wi-Fi Protected Access) Encryption
    • WPA2 Encryption
    • WEP vs. WPA vs. WPA2
    • Wi-Fi Authentication Method
    • Wi-Fi Authentication Process Using a Centralized Authentication Server
    • Wireless Network Threats
    • Bluetooth Threats
    • Wireless Network Security
    • Wi-Fi Discovery Tools
    • Locating Rogue Access points
    • Protecting from Denial-of-Service Attacks: Interference
    • Assessing Wireless Network Security
    • Wi-Fi Security Auditing Tool: AirMagnet WiFi Analyzer
    • WPA Security Assessment Tool
    • Wi-Fi Vulnerability Scanning Tools
    • Deploying Wireless IDS (WIDS) and Wireless IPS (WIPS)
    • WIPS Tool
    • Configuring Security on Wireless Routers
    • Additional Wireless Network Security Guidelines
     

    MODULE 11: NETWORK TRAFFIC MONITORING AND ANALYSIS

    • Network Traffic Monitoring and Analysis(Introduction)
    • Network Monitoring: Positioning your Machine at Appropriate Location
    • Network Traffic Signatures
    • Packet Sniffer: Wireshark
    • Detecting OS Fingerprinting Attempts
    • Detecting PING Sweep Attempt
    • Detecting ARP Sweep/ ARP Scan Attempt
    • Detecting TCP Scan Attempt
    • Detecting SYN/FIN DDOS Attempt
    • Detecting UDP Scan Attempt
    • Detecting Password Cracking Attempts
    • Detecting FTP Password Cracking Attempts
    • Detecting Sniffing (MITM) Attempts
    • Detecting the Mac Flooding Attempt
    • Detecting the ARP Poisoning Attempt
    • Additional Packet Sniffing Tools
    • Network Monitoring and Analysis
    • Bandwidth Monitoring
     

    MODULE 12: NETWORK RISK AND VULNERABILITY MANAGEMENT

    • What is Risk?
    • Risk Levels
    • Risk Matrix
    • Key Risk Indicators(KRI)
    • Risk Management Phase
    • Enterprise Network Risk Management
    • Vulnerability Management
    • Reporting
    • Remediation
    • Verification
     

    MODULE 13: DATA BACKUP AND RECOVERY

    • Introduction to Data Backup
    • RAID (Redundant Array Of Independent Disks) Technology
    • Storage Area Network (SAN)
    • Network Attached Storage (NAS)
    • Selecting Appropriate Backup Method
    • Choosing the Right Location for Backup
    • Backup Types
    • Conducting Recovery Drill Test
    • Data Recovery
    • Windows Data Recovery Tool
    • RAID Data Recovery Services
    • SAN Data Recovery Software
    • NAS Data Recovery Services
     

    MODULE 14: NETWORK INCIDENT RESPONSE AND MANAGEMENT

    • Incident Handling and Response
    • Incident Response Team Members: Roles and Responsibilities
    • First Responder
    • Incident Handling and Response Process
    • Overview of IH&R Process Flow

Novas Turmas:

Carga Horária: 40 horas/aula

 

Atendimento Personalizado

Para saber mais sobre os treinamentos, certificações e soluções de TI da SoftSell, entre em contato com a gente.
É só escolher o seu canal preferido e aguardar breve resposta em horário comercial:

Curitiba: 41 3204.1999
Demais localidades: 4007.2186
WhatsApp : 41 98754.3534
Email: contato@softsell.com.br
 

ENDEREÇO
Rua Emiliano Perneta, 680 – 9º Andar
Centro – Curitiba – Paraná – 80420-080