Call 1-800-305-3855 for more information on available plans and pricing
Study at your own pace
PND comes with life-time access to course material and flexible access to the world’s best virtual labs on Network Security.
Practice Network defense against real world attacks. PND includes the most sophisticated virtual lab on IT Security: Hera Lab
Obtain the eNDP certification and prove your practical skills with the only 100% practical certification on Network Defense
Course at a glance
- Close the gap between Network attack and defense
- Teaches defense which is valuable for both the defense team and offense team
- Full practical setup guides
- Configuration features to control, identify and prevent threats
- Secure network design concepts and configuration of network appliances
- 10 different lab scenarios to practice with
- Configure secure remote access with practical examples
- Windows configuration policies, domains, AD and much more
- After obtaining the eNDP certification qualifies you for 40 CPE
- 5+ hours of video training material
- Over 1500 slides
- 10 Labs in Hera
- Self-paced / HTML5, PDF, MP4
- Off-line access available
- Access from PC, Tablet and Smartphone
- Module 1 : Introduction
In this module, you will learn the basics of information security, including the ‘why’ and a lot of the associated vocabulary.
- Module 2 : TCP
How TCP works is a very important concept to understand. This module covers the OSI/TCP models, the connections themselves and how you can explore live connections yourself with Wireshark.
- Module 3 : Attacks
As Sun Tzu said, “know your enemy”. This module explains some of the attack vectors you will be dealing with when it comes to defending your network. This module concludes in a full scenario of a company’s network being compromised.
- Module 4 : Perimeter Appliances
In this module, you will learn the majority of the network security appliances in use today.
- Module 5 : Secure network Design – Part I
One of the most important fundamental topics when it comes to securing a network is the design and topology of the network. This module will teach you the considerations and strategies used when planning for a secure network.
- Module 6 : Firewall configuration – Part I
When it comes to the perimeter or network segmentation, the firewall is an integral technology. In this module, you will look at configuring a firewall appliance from start to finish with focus on the ACL. This module also covers some of the Next Generation Firewall features such as application identification, IPS and web filtering.
- Module 7 : Firewall configuration – Part II
Some of today’s firewalls and other network security appliances are including advanced features to allow you to secure your network even more. This module will show you some of these features to help you control, identify and prevent threats.
- Module 8 : Secure network design – Part II
The first module introduced you to secure network design and this module will expand upon that topic. You will learn more on network segmentation at both the layer 3 and layer 2 levels.
- Module 9 : VPN
Providing secure remote access is becoming a very common requirement these days whether it is a site to site tunnel or remote access for your mobile workforce. This module will teach you what you need to know about both as well as walk you through practical examples of deploying them.
- Module 10 : Switch configuration
Switches are often overlooked in the security plan but can provide additional security at layer two. This module will look at setting up a switch, hardening the device itself and setting up many layer 2 security layers.
- Module 11 : System Security
This module introduces you to some of the core topics with regard to system security. It covers the basics of the technologies and strategies in involved in every endpoint protection plan.
- Module 12 : Active Directory
The foundation for any Windows network is Active Directory. It takes care of your access control, manage users and groups, and set policies to control and harden your Windows domain-joined computers/servers via Group Policy. Finally, we will cover Active Directory Certificate Services and how to set it up correctly so you can implement a PKI.
- Module 13 : WSUS
As you will learn in this course and may already know, patch management is essential to keeping your systems safe. This module will teach you how to setup and manage Windows Server Update Services so you can control and monitor the Windows patch levels in your environment.
- Module 14 : Microsoft EMET
Vulnerabilities and exploits are growing exponentially. Signature-based IDS/IPS is the most efficient method to prevent attacks so you will learn about Microsoft EMET which makes a successful exploit much more “expensive” for the attacker. This program also helps to keep your network safer in the zero-day window when no patch is available for a given program or operating system.
- Module 15 : Group Policy Revisited
This first Active Directory module provided an introduction to Group Policy. In this module, we will take a look at several more Group Policy examples to show you some ways you can secure your Windows endpoints
- Module 16 : Endpoint Security
The first module introduced many of the endpoint security topics. This module will take a deeper dive into endpoint security and some of the specific things you should consider in your strategy. You will also see a couple attacks and see practical mitigations for preventing them.
- Module 17 : Printers
Printers are usually overlooked yet sensitive information is usually sent to the printer via print or fax capabilities. In addition, many of today’s printers run on a Linux kernel and are sometimes used as pivot points in attacks. This module will teach you the settings you need to configure to harden every printer on your network.
- Module 18 : Vulnerabilities
An important part of any security program is vulnerability management. This module will teach you the steps of a vulnerability management program including port scans, vulnerability scans, reporting and remediation.
- Module 19 : Controlling Vendor Access
Understanding the need to give your vendors secure access to your network while protecting your network from their connection is crucial; many of the attacks over the past few years have stemmed from vendors being compromised and the attackers using the vendor’s remote access to pivot deeper into their target’s network. This module will look at some important things to consider with regard to vendor management and how to secure yourself against unwanted activity.
- Basic understanding of networking: TCP/IP, Routing
- Basic understanding of IT Security matters
- Intermediate understanding of the Windows operating system
This training course is for…
- System/Network Administrators
- Penetration testers
- IT admins and staff
Each lab is associated with a chapter from the course and will provide you with misconfigured or vulnerable network design. You are expected to find security issues, fix them and verify that the patches applied work.
Each lab comes with a manual that walks you through the steps to take.
|Lab 1||Active Directory-Basic User Management and Group Policy with Active Directory||Network Defense|
|Lab 2||Active Directory Certificate Services-Setting up PKI with A.D. Certificate Services||Network Defense|
|Lab 3||WSUS-Patching Windows with WSUS||Network Defense|
|Lab 4||EMET-Protecting Windows with EMET||System Defense|
|Lab 5||Group Policy||Network Defense|
|Lab 6||Endpoint||Network Defense|
|Lab 7||Vulnerabilites-Business Logic Flaws||Network Defense|
|Lab 8||Remediation-Vulnerability Remediation||Network Defense|
|Lab 9||ACL-Configuring ACLs on Firewalls||Network Defense|
|Lab 10||OpenVPN-Configuring OpenVPN on pfSense||Network Defense|