Call 1-800-305-3855 for  more information on available plans and pricing

Study at your own pace

PND comes with life-time access to course material and flexible access to the world’s best virtual labs on Network Security.

Extremely Hands-on

Practice Network defense against real world attacks. PND includes the most sophisticated virtual lab on IT Security: Hera Lab

Become Certified

Obtain the eNDP certification and prove your practical skills with the only 100% practical certification on Network Defense

Course at a glance
  • Close the gap between Network attack and defense
  • Teaches defense which is valuable for both the defense team and offense team
  • Full practical setup guides
  • Configuration features to control, identify and prevent threats
  • Secure network design concepts and configuration of network appliances
  • 10 different lab scenarios to practice with
  • Configure secure remote access with practical examples
  • Windows configuration policies, domains, AD and much more
  • After obtaining the eNDP certification qualifies you for 40 CPE
Course Material
  •     5+ hours of video training material
  •     Over 1500 slides
  •     10 Labs in Hera
Course Delivery
  •     Self-paced / HTML5, PDF, MP4
  •     Off-line access available
  •     Access from PC, Tablet and Smartphone
Syllabus
  • Module 1 : Introduction

    In this module, you will learn the basics of information security, including the ‘why’ and a lot of the associated vocabulary.

  • Module 2 : TCP

    How TCP works is a very important concept to understand. This module covers the OSI/TCP models, the connections themselves and how you can explore live connections yourself with Wireshark.

  • Module 3 : Attacks

    As Sun Tzu said, “know your enemy”. This module explains some of the attack vectors you will be dealing with when it comes to defending your network. This module concludes in a full scenario of a company’s network being compromised.

  • Module 4 : Perimeter Appliances

    In this module, you will learn the majority of the network security appliances in use today.

  • Module 5 : Secure network Design – Part I

    One of the most important fundamental topics when it comes to securing a network is the design and topology of the network. This module will teach you the considerations and strategies used when planning for a secure network.

  • Module 6 : Firewall configuration – Part I

    When it comes to the perimeter or network segmentation, the firewall is an integral technology. In this module, you will look at configuring a firewall appliance from start to finish with focus on the ACL. This module also covers some of the Next Generation Firewall features such as application identification, IPS and web filtering.

  • Module 7 : Firewall configuration – Part II

    Some of today’s firewalls and other network security appliances are including advanced features to allow you to secure your network even more. This module will show you some of these features to help you control, identify and prevent threats.

  • Module 8 : Secure network design – Part II

    The first module introduced you to secure network design and this module will expand upon that topic. You will learn more on network segmentation at both the layer 3 and layer 2 levels.

  • Module 9 : VPN

    Providing secure remote access is becoming a very common requirement these days whether it is a site to site tunnel or remote access for your mobile workforce. This module will teach you what you need to know about both as well as walk you through practical examples of deploying them.

  • Module 10 : Switch configuration

    Switches are often overlooked in the security plan but can provide additional security at layer two. This module will look at setting up a switch, hardening the device itself and setting up many layer 2 security layers.

  • Module 11 : System Security

    This module introduces you to some of the core topics with regard to system security. It covers the basics of the technologies and strategies in involved in every endpoint protection plan.

  • Module 12 : Active Directory

    The foundation for any Windows network is Active Directory. It takes care of your access control, manage users and groups, and set policies to control and harden your Windows domain-joined computers/servers via Group Policy. Finally, we will cover Active Directory Certificate Services and how to set it up correctly so you can implement a PKI.

  • Module 13 : WSUS

    As you will learn in this course and may already know, patch management is essential to keeping your systems safe. This module will teach you how to setup and manage Windows Server Update Services so you can control and monitor the Windows patch levels in your environment.

  • Module 14 : Microsoft EMET

    Vulnerabilities and exploits are growing exponentially. Signature-based IDS/IPS is the most efficient method to prevent attacks so you will learn about Microsoft EMET which makes a successful exploit much more “expensive” for the attacker. This program also helps to keep your network safer in the zero-day window when no patch is available for a given program or operating system.

  • Module 15 : Group Policy Revisited

    This first Active Directory module provided an introduction to Group Policy. In this module, we will take a look at several more Group Policy examples to show you some ways you can secure your Windows endpoints

  • Module 16 : Endpoint Security

    The first module introduced many of the endpoint security topics. This module will take a deeper dive into endpoint security and some of the specific things you should consider in your strategy. You will also see a couple attacks and see practical mitigations for preventing them.

  • Module 17 : Printers

    Printers are usually overlooked yet sensitive information is usually sent to the printer via print or fax capabilities. In addition, many of today’s printers run on a Linux kernel and are sometimes used as pivot points in attacks. This module will teach you the settings you need to configure to harden every printer on your network.

  • Module 18 : Vulnerabilities

    An important part of any security program is vulnerability management. This module will teach you the steps of a vulnerability management program including port scans, vulnerability scans, reporting and remediation.

  • Module 19 : Controlling Vendor Access

    Understanding the need to give your vendors secure access to your network while protecting your network from their connection is crucial; many of the attacks over the past few years have stemmed from vendors being compromised and the attackers using the vendor’s remote access to pivot deeper into their target’s network. This module will look at some important things to consider with regard to vendor management and how to secure yourself against unwanted activity.

Pre-requisites
  • Basic understanding of networking: TCP/IP, Routing
  • Basic understanding of IT Security matters
  • Intermediate understanding of the Windows operating system
This training course is for…
  • System/Network Administrators
  • Penetration testers
  • IT admins and staff
Labs

Each lab is associated with a chapter from the course and will provide you with misconfigured or vulnerable network design. You are expected to find security issues, fix them and verify that the patches applied work.

Each lab comes with a manual that walks you through the steps to take.

Lab IDDescriptionCategory
Lab 1Active Directory-Basic User Management and Group Policy with Active DirectoryNetwork Defense
Lab 2Active Directory Certificate Services-Setting up PKI with A.D. Certificate ServicesNetwork Defense
Lab 3WSUS-Patching Windows with WSUSNetwork Defense
Lab 4EMET-Protecting Windows with EMETSystem Defense
Lab 5Group PolicyNetwork Defense
Lab 6EndpointNetwork Defense
Lab 7Vulnerabilites-Business Logic FlawsNetwork Defense
Lab 8Remediation-Vulnerability RemediationNetwork Defense
Lab 9ACL-Configuring ACLs on FirewallsNetwork Defense
Lab 10OpenVPN-Configuring OpenVPN on pfSenseNetwork Defense

Call 1-800-305-3855 for  more information on available plans and pricing