CNDv2 – Certified Network Defender v2
This Course Includes
Videos & Lectures
Quizzes & Assessments
Mobile access
Certificate of Completion
Introduction
The CND certification program focuses on training Network Administrators to protect, detect, respond to, and predict threats on the network. This builds upon the typical knowledge and skills of Network Administrators in network components, traffic, performance and utilization, network topology, system locations, and security policies.
Cybersecurity is a continuous, non-linear process. Therefore, your approach to mitigating cyber risks cannot be static. This is particularly important when the new “normal” has millions of employees working from remote locations on fragile, home-based WiFi networks and nonsanitized personal devices.
According to Gartner, traditional “prevent and detect” approaches are inadequate. Opportunistic by nature, malicious actors look for the easiest ways to attack the most users and siphon off the maximum gains. Developing a continuous Adaptive Security Cycle helps organizations stay ahead of cybercriminals by creating and improving security systems. Enter CND v2.
CND v2 is based on the cybersecurity education framework and work role task analysis presented by the National Infocomm Competency Framework (NICF). The program is also mapped to the Department of Defense (DoD) roles for system/network administrators as well as global work roles and responsibilities laid out by the revised NICE Framework 2.0.
What is NEW in CND V2?
- The newly updated CND V2 includes the Adaptive Security Strategy, increasing scope from the former Protect – Detect – Respond to Protect – Detect – Respond – Predict trategy.
- CND has a dedicated focus on IoT Security exposing learners to various security challenges that IoT devices pose and the measures required to mitigate them.
- It allows students to implement and manage the security of virtualization technologies such as Network Virtualization (NV), Software-Defined Network (SDN), Network Function Virtualization (NFV), OS Virtualization, Containers, Dockers, and Kubernetes used in modern day networks.
- The new CND program has a special focus on mobile security measures and covers enterprise mobile device security and access control security strategies much deeper than its predecessor as they are extremely relevant in a mobile enabled enterprise. A CND professional shall be trained to ensure that end points in their organization do not pose a security risk.
- Increased focus on cloud security with enterprise cloud security, AWS security, Microsoft Azure security, Google Cloud Platform security.
- CND includes an introduction to threat intelligence, in-depth attack surface analysis, and business continuity and disaster recovery concepts.
Audience Profile
- Information Security Analyst / Administrator
- Information Assurance (IA) Security Officer
- Information Security Manager / Specialist
- Information Systems Security Engineer / Manager
- Information Security Professionals / Officers
- Information Security / IT Auditors
- Risk / Threat/Vulnerability Analyst
- System Administrators
- Network Administrators and Engineers
Outcomes
After completing this course, attendees will:
- Understanding network security management
- Establishing network security policies and procedures
- Windows and Linux security administration
- Setting up mobile and IoT device security
- Implementing data security techniques on networks
- Embedding virtualization technology security
- Determining cloud and wireless security
- Deploying and using risk assessment tools
- Learn basics of first response and forensics
- Understanding indicators of Compromise, Attack, and Exposures (IoC, IoA, IoE)
- Building threat intelligence capabilities
- Establishing and monitoring log management
- Implementing endpoint security
- Configuring optimum firewall solutions
- Understanding and using IDS/IPS technologies
- Establishing Network Authentication, Authorization, Accounting (AAA)
Onsite training?
If you need training for three or more people, ask us about training at your site. You can enjoy the convenience of reduced travel cost and time, as well as a familiar environment for your staff. Additionally, we can customise the course for your business needs.
The Certified Ethical Hacking training course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
Module Topics
- Network Attacks and Defense Strategies
- Administrative Network Security
- Technical Network Security
- Network Perimeter Security
- Endpoint Security-Windows Systems
- Endpoint Security-Linux Systems
- Endpoint Security- Mobile Devices
- Endpoint Security-IoT Devices
- Administrative Application Security
- Data Security
- Enterprise Virtual Network Security
- Enterprise Cloud Network Security
- Enterprise Wireless Network Security
- Network Traffic Monitoring and Analysis
- Network Logs Monitoring and Analysis
- Incident Response and Forensic Investigation
- Business Continuity and Disaster Recovery
- Risk Anticipation with Risk Management
- Threat Assessment with Attack Surface Analysis
- Threat Prediction with Cyber Threat Intelligence

Requirements
- English Knowledge
- Understands Basics
Send us your question now
You can reach us through our contact form, by email, or by phone. We will get back to you within 1 business day.
Pro Trainers Hub empowers instructors with resources, support, and a platform to share knowledge.
Company Info
Courses
Contact Info
- No 15, Crestwood 1,Thalawatugoda 10116
- +94 77 276 6824
- info@protrainershub.com
© 2025 All Rights Reserved. | Reg : PV00328463