Skip to main Content

E-Learning: Network Defense Essentials (EC-NDE)

  • Price: eur195.00
  • Code: EC-NDE

eur195.00

excl. VAT

Add to Cart Add to Cart

Description

Top

Network Defense Essentials is an introductory cybersecurity course that covers the fundamental concepts of information security and network defense. Those who are interested in pursuing a career in information security will learn the various fundamentals of information security and network defense, as well as what to expect in the field of network defense. The interactive labs component of this course ensures that student receive the hands-on, practical experience to give them the skills necessary for a future in cybersecurity.

Learn a holistic overview of the key components of information security such as Identification, Authentication and Authorization, Virtualization and Cloud Computing, Wireless Network, Mobile Device and IoT Device and Data Security. This active learning course ensures that students receive the hands-on, practical experience required to give them the skills necessary for a future in cybersecurity.

Further Information

Top

Exams:

Passing Score

In order to maintain the high integrity of our certification exams, EC-Council Exams are provided in multiple forms (I.e. different question banks). Each form is carefully analyzed through beta testing with an appropriate sample group under the purview of a committee of subject matter experts that ensure that each of our exams not only has academic rigor but also has “real world” applicability. We also have a process to determine the difficulty rating of each question. The individual rating then contributes to an overall “Cut Score” for each exam form. To ensure each form has equal assessment standards, cut scores are set on a “per exam form” basis. Depending on which exam form is challenged, cut scores can range from 60% to 78%.

Exam Details

Exam Length: 2 Hours

Exam Format: Multiple Choice

Exam Platform: ECC Exam Center

# of Questions: 75

Certification: Network Defense Essentials

 

Jobe Roles:

- Help Desk Technician

- Technical Support Specialist

- Desktop Support Technician

- Cyber Crime Analyst

- Cybersecurity Specialist

- Cybersecurity Technician

- Desktop Support

- Desktop Support Technician

- Network Administrator

- Incident & Intrusion Analyst

- IT Security Specialist

- Network Technical Specialist

- Cyber Forensic Specialist

- Intelligence Operations Specialist

- Cyber Operations Technician

Objectives

Top
  • Discuss fundamental concepts of network security, including Information Assurance (IA) principles, network defense challenges, defense approaches, security controls, and review essential network security protocols.
  • Discuss access control principles, terminologies, and models, and describe Identity and Access Management (IAM) concepts.
  • Examine various administrative network defense controls, including frameworks, laws,acts, and security policies.
  • Examine various physical network defense controls, including physical security controls, workplace security, and environmental controls.
  • Examine various technical network defense controls, including network segmentation, firewall, IDS/IPS, honeypot, proxy server, VPN, SIEM, UBA, and anti-malware.
  • Comprehend fundamental virtualization concepts, Virtualization Security Concerns, cloud computing, and suggest security best practices.
  • Explain wireless network fundamentals, different types of wireless encryption, and suggest security measures.
  • Discuss various mobile device connection methods, Mobile Device Management concepts, common mobile usage policies, examine different security risks, and review general security guidelines and best practices for mobile platforms.
  • Discuss working of IoT devices, application areas, communication models, IoT security principles, IoT framework security considerations, IoT device management, and identify IoT security best practices.
  • Discuss cryptography techniques, various cryptographic algorithms, and Public Key Infrastructure (PKI), and use various cryptography tools to protect information.
  • Discuss data security concepts, the importance of data encryption, data loss prevention, and compare different data backup concepts and technologies.
  • Discuss the need and advantages of network traffic monitoring, determine baseline traffic signatures for normal and suspicious network traffic, and perform network monitoring for suspicious traffic.

Content

Top
  • Network Security Fundamentals
  • Identification, Authentication and Authorization
  • Administrative Controls
  • Physical Controls
  • Technical Controls
  • Virtualization and Cloud Computing
  • Wireless Network Security
  • Mobile Device Security
  • IoT Device Security
  • Cryptography and PKI
  • Data Security
  • Network Traffic Monitoring