Department of Cybersecurity, Faculty of Computing, University of Port Harcourt

Network Defense Essentials (N|DE)

Version 1, Labs w/CTF, Exam Prep, ECC EV w/RPS

Begin your Cybersecurity Journey with Hands-on, Foundational Skills in Network Security

Self Paced (Discount)

N197,183

Tutor Led (Discount)

347,183

Official Price

508,300

EC-Council Network Defense Essentials (N|DE) Certification

The Network Defense Essentials (N|DE) covers the fundamental concepts of information security and network defense, providing a holistic overview of identification, authentication, authorization, visualization, and more. No IT/Cybersecurity experience required for this course.

Test your skills with CTF-based Capstone Projects and validate these newly acquired skills in proctored exams. With 12 modules, 14+ hours of premium self-paced video training, and 11 interactive labs, the series enables you to add formal recognition to your resume, demonstrating your skills and expertise to employers.

Key Features
  • 11 lab activities in a simulated lab environment
  • 14+ hours of premium self-paced video training
  • 750+ pages of ecourseware
  • Capstone Projects with Real-World CTF Challenges
  • Gain a year-long access to courseware and 6-month access to labs
  • Proctored exam voucher with one-year validity
  • Gain the globally recognized EC-Council’s certification
  • Increase your value in the job market to advance your career

EC-Council Network Defense Essentials (N|DE) Course Information

Module 01: Network Security Fundamentals

Topics Covered:

Fundamentals of Network Security

Network Security Protocols

Module 02: Identification, Authentication and Authorization

Topics Covered:

Access Control Principles, Terminologies, and Models

Identity and Access Management (IAM) Concepts

Lab Exercise:

Implementing Access Controls in Windows Machine

Managing Access Controls in Linux Machine

Implementing Role-Based Access Control in Windows Admin Center (WAC)

Module 03: Network Security Controls – Administrative Controls

Topics Covered:

Regulatory Frameworks, Laws, and Acts

Design and Develop Security Policies

Conduct Different Types of Security and Awareness Training

Lab Exercise:

Implementing Password Policies Using Windows Group Policy

Module 04: Network Security Controls – Physical Controls

Topics Covered:

Importance of Physical Security

Physical Security Controls

Workplace Security

Environmental Controls

Module 05: Network Security Controls – Technical Controls

Topics Covered:

Types of Network Segmentation

Types of Firewalls and their Role

Types of IDS/IPS and their Role

Types of Honeypots

Types of Proxy Servers and their Benefits

Fundamentals of VPN and its importance in Network Security

Security Incident and Event Management (SIEM)

User Behavior Analytics (UBA)

Antivirus/Anti-malware Software

Lab Exercise:

Implementing Host-Based Firewall Protection with iptables

Implementing Host-Based Firewall Functionality Using Windows Firewall

Implementing Network-Based Firewall Functionality: Blocking Unwanted Website access using pfSense Firewall

Implementing Network-Based Firewall Functionality: Blocking Insecure Ports using pfSense Firewall

Implementing Host-Based IDS functionality using Wazuh HIDS

Implementing Network-based IDS Functionality Using Suricata IDS

Detect Malicious Network Traffic using HoneyBOT

Establishing Virtual Private Network Connection using SoftEther VPN

Module 06: Virtualization and Cloud Computing

Topics Covered:

Virtualization Essential Concepts and OS

Virtualization Security

Cloud Computing Fundamentals

Insights of Cloud Security and Best Practices

Lab Exercise:

Auditing Docker Host Security Using Docker-Bench-Security Tool

Implementing AWS Identity and Access Management

Securing Amazon Web Services Storage

Module 07: Wireless Network Security

Topics Covered:

Wireless Network Fundamentals

Wireless Network Encryption Mechanisms

Types of Wireless Network Authentication Methods

Implement Wireless Network Security Measures

Lab Exercise:

Configuring Security on a Wireless Router

Module 08: Mobile Device Security

Topics Covered:

Mobile Device Connection Methods

Mobile Device Management Concepts

Common Mobile Usage Policies in Enterprises

Security Risks and Guidelines Associated with Enterprises Mobile Usage Policies

Implement Enterprise-level Mobile Security Management Solutions

Implement General Security Guidelines and Best Practices on Mobile Platforms

Lab Exercise:

Implementing Enterprise Mobile Security Using Miradore MDM Solution

Module 09: IoT Device Security

Topics Covered:

IoT Devices, Application Areas, and Communication Models

Security in IoT-enabled Environments

Lab Exercise:

Securing IoT Device Communication Using TLS/SSL

Module 10: Cryptography and PKI

Topics Covered:

Cryptographic Techniques

Cryptographic Algorithms

Cryptography Tools

Public Key Infrastructure (PKI)

Lab Exercise:

Calculate One-way Hashes using HashCalc

Calculate MD5 Hashes using HashMyFiles

Create a Self-signed Certificate

Module 11: Data Security

Topics Covered:

Data Security and its Importance

Security Controls for Data Encryption 8

Data Backup and Retention

Data Loss Prevention Concepts

Lab Exercise:

Perform Disk Encryption using VeraCrypt

File Recovery Using EaseUS Data Recovery Wizard

Backing Up and Restoring Data in Windows

Module 12: Network Traffic Monitoring

Topics Covered:

Need and Advantages of Network Traffic Monitoring

Determine Baseline Traffic Signatures for Normal and Suspicious Network Traffic

Perform Network Monitoring for Suspicious Traffic

Lab Exercise:

Capturing Network Traffic using Wireshark

Applying Various Filters in Wireshark

Analyzing and Examining Various Network Packet Headers in Linux using tcpdump

  • Key issues plaguing network security.
  • Essential network security protocols.
  • Identification, authentication, and authorization concepts.
  • Network security controls:
  • Administrative controls (frameworks, laws, acts, and security policies).
  • Physical controls (physical security controls, workplace security, and environmental controls).
  • Technical controls (network segmentation, firewall, IDS/IPS, honeypot, proxy server, VPN, SIEM, UBA, and anti-malware).
  • Fundamentals of virtualization, cloud computing, and cloud security.
  • Wireless network fundamentals, wireless encryption, and security measures.
  • Fundamentals of mobile and IoT devices and their security measures.
  • Cryptography and PKI concepts.
  • Data security, data encryption, and data backup and data loss prevention techniques.
  • Network traffic monitoring for suspicious traffic.
  • High School/ College/University students

Students, graduates, professionals, career starters and changers. High- school students who aspire to get an early start on their cybersecurity careers and master the fundamentals of security online.

  • Teams and organizations

IT/technology/cybersecurity teams with little or no work experience.

  • Career starters

College or University students interested in preparing for a cybersecurity career and aiding their IT education.

  • Working professionals

Working professionals who are preparing to start with cybersecurity or switch to the field from another domain.

Training Details: Self-paced, in-demand lecture videos led by world-class instructors and hands-on labs.

Pre-requisite: No prior cybersecurity knowledge or IT work experience required.

Exam Details:

Exam Code: 112-51

Number of Questions: 75

Duration: 2 hours

Test Format: Multiple Choice

Secure Your Future in Cybersecurity !!!

  • 100% Discount on Training Fees
  • Tutor-Led Training at an Affordable Rate
  • 12-Month Access to Labs & Study Materials
  • Earn Globally Recognized EC-Council Certifications