Course Offering
- Fast Lane
- Guaranteed to Run Schedule
- Digital Learning Solutions
- Fast Lane IT Workshops
- Fast Lane LIVE E-Learning
- Fast Lane Academy»
-
Professional Services»
- Home
- Content Development
- Expert 4 Hire
- Selected Technologies
- Artificial Intelligence (AI)
- Cloud
- Optical
- Security
- Wireless & Mobility
- Selected Vendors
- AWS
- Cisco
- Gigamon
- NetApp
- Microsoft
- Red Hat
- SUSE
- VMware
- Featured Vendors
- Amazon Web Services»
- Aruba»
- Cisco Systems»
- Citrix»
- Cydrill Software Security»
- EC-Council»
- Google Cloud»
- Juniper Networks»
-
Microsoft»
- What's New
- Microsoft Training
- Microsoft Certifications
- Microsoft E-Learning
- Upcoming Microsoft Courses
- Microsoft Professional Services
- Cloud Professional Services
- Redeem Microsoft SATVs
- Featured Topics
- AI Business School
- Microsoft Azure
- Microsoft Power Platform
- Microsoft Security, Compliance & Identity
- NetApp»
- Red Hat»
- Splunk»
- SUSE»
- VMware»
- Additional Vendors»
- Featured Technologies
- Artificial Intelligence (AI)»
- Cloud Computing»
- Cyber Security»
- Data Center»
- Network Analysis / Wireshark»
- Software Development»
- Wireless & Mobility»
- IT & Project Management»
- ITIL»
- PRINCE2»
- Scaled Agile»
- Scrum
- Home
- Training
- EC-Council
- NDE
Network Defense Essentials
Overview
Network Defense Essentials is a first-of-its-kind MOOC certification that provides foundational knowledge and skills in network security with add-on labs for handson experience. The course includes 12 modules and optional upgrades to lab ranges covering fundamental network security concepts, including IoT, cryptography, and PKI.
Who should attend
EC-Council’s Essentials Series programs and certifications build and validate candidates’ skills for their cybersecurity future. It is ideal for IT professionals who are seeking to foray into the exciting world of cybersecurity. Cybersecurity enthusiasts and students will readily find the program interesting, challenging, and useful.
Course Objectives
EC-Council’s Essentials Series is the first MOOC certification course series covering essential skills in network defense, ethical hacking, and digital forensics. The Network Defense Essentials (N|DE), Ethical Hacking Essentials (E|HE), and Digital Forensics Essentials (D|FE) are foundational programs that help students and early career professionals choose their area of competency or select a specific interest in cybersecurity. The Essentials Series was designed to give students the foundation on which to build and develop the essential skills for tomorrow’s careers in cybersecurity. These programs educate learners in a range of techniques across industry verticals, such as securing networks, mitigating cyber risks, conducting forensic investigations, and more.
Outline
Network Security Fundamentals
- Fundamentals of network security
- Network security protocols that govern the flow of data
Identification, Authentication, and Authorization
- Access control principles, terminologies, and models
- Identity and access management (IAM)
Network Security Controls: Administrative Controls
- Regulatory frameworks, laws, and acts
- Security policies, and how to conduct security and awareness training
Network Security Controls: Physical Controls
- Importance of physical security and physical security controls
- Physical security policies and procedures
- Best practices to strengthen workplace security
- Environmental controls
Network Security Controls: Technical Controls
- Types of bastion hosts and their role in network security
- IDS/IPS types and their role in network defense
- Types of honeypots and virtual private networks (VPNs)
- Security incident and event management (SIEM)
Virtualization and Cloud Computing
- Key concepts of virtualization and OS virtualization security
- Cloud computing fundamentals and cloud deployment models
- Cloud security best practices
Wireless Network Security
- Fundamentals of wireless networks and encryption mechanisms
- Wireless network authentication methods
- Implementing wireless network security measures
Mobile Device Security
- Mobile device connection methods and management
- Mobile use approaches in enterprises
- Security risks and guidelines associated with enterprise mobile usage policies
- Implement various enterprise-level mobile security management solutions
- Best practices on mobile platforms
IoT Device Security
- IoT devices, application areas, and communication models
- How security works in IoT-enabled environments
Cryptography and PKI
- Cryptographic tools, security techniques, and algorithms
- Public key infrastructure (PKI) to authenticate users and devices in the digital world
Data Security
- Data security and its importance
- Security controls for data encryption
- Perform data backup and retention
- Implement data loss prevention concepts
Network Traffic Monitoring
- Network traffic monitoring concepts.
- Traffic signatures for normal and suspicious network traffic.
- Perform network monitoring to detect suspicious traffic.