Select a different country or region to see content specific to your location and make online purchases.
x
GB
/
GBP
Image
Filter Events

EC-Council Network Defense Essentials

WGAC-ECC-NDE

Ec Council Training Courses Certification

Schedule

See all Courses

Description

Network Security Fundamentals

  • Fundamentals of network security
  • Network security protocols that govern the flow of data

Identification, Authentication, and Authorization

  • Access control principles, terminologies, and models
  • Identity and access management (IAM)

Network Security Controls: Administrative Controls

  • Regulatory frameworks, laws, and acts
  • Security policies, and how to conduct security and awareness training

Network Security Controls: Physical Controls

  • Importance of physical security and physical security controls
  • Physical security policies and procedures
  • Best practices to strengthen workplace security
  • Environmental controls

Network Security Controls: Technical Controls

  • Types of bastion hosts and their role in network security
  • IDS/IPS types and their role in network defense
  • Types of honeypots and virtual private networks (VPNs)
  • Security incident and event management (SIEM)

Virtualization and Cloud Computing

  • Key concepts of virtualization and OS virtualization security
  • Cloud computing fundamentals and cloud deployment models
  • Cloud security best practices

Wireless Network Security

  • Fundamentals of wireless networks and encryption mechanisms
  • Wireless network authentication methods
  • Implementing wireless network security measures

Mobile Device Security

  • Mobile device connection methods and management
  • Mobile use approaches in enterprises
  • Security risks and guidelines associated with enterprise mobile usage policies
  • Implement various enterprise-level mobile security management solutions
  • Best practices on mobile platforms

IoT Device Security

  • IoT devices, application areas, and communication models
  • How security works in IoT-enabled environments

Cryptography and PKI

  • Cryptographic tools, security techniques, and algorithms
  • Public key infrastructure (PKI) to authenticate users and devices in the digital world

Data Security

  • Data security and its importance
  • Security controls for data encryption
  • Perform data backup and retention
  • Implement data loss prevention concepts

Network Traffic Monitoring

  • Network traffic monitoring concepts.
  • Traffic signatures for normal and suspicious network traffic.
  • Perform network monitoring to detect suspicious traffic.

The description for this course is currently being updated.

EC-Council’s Essentials Series is the first MOOC certification course series covering essential skills in network defense, ethical hacking, and digital forensics. The Network Defense Essentials (N|DE), Ethical Hacking Essentials (E|HE), and Digital Forensics Essentials (D|FE) are foundational programs that help students and early career professionals choose their area of competency or select a specific interest in cybersecurity. The Essentials Series was designed to give students the foundation on which to build and develop the essential skills for tomorrow’s careers in cybersecurity. These programs educate learners in a range of techniques across industry verticals, such as securing networks, mitigating cyber risks, conducting forensic investigations, and more.

The description for this course is currently being updated.
We use cookies to understand how you use our site and to improve your experience. To learn more, click here. Read our revised Privacy Policy and Terms and Conditions.