Network Defense Essentials (N|DE)
Begin your Cybersecurity Journey with Hands-on, Foundational Skills in Network Security
Self Paced (Discount)
N197,183
Tutor Led (Discount)
347,183
Official Price
508,300
EC-Council Network Defense Essentials (N|DE) Certification
The Network Defense Essentials (N|DE) covers the fundamental concepts of information security and network defense, providing a holistic overview of identification, authentication, authorization, visualization, and more. No IT/Cybersecurity experience required for this course.
Test your skills with CTF-based Capstone Projects and validate these newly acquired skills in proctored exams. With 12 modules, 14+ hours of premium self-paced video training, and 11 interactive labs, the series enables you to add formal recognition to your resume, demonstrating your skills and expertise to employers.
Key Features
EC-Council Network Defense Essentials (N|DE) Course Information
Module 01: Network Security Fundamentals
Topics Covered:
Fundamentals of Network Security
Network Security Protocols
Module 02: Identification, Authentication and Authorization
Topics Covered:
Access Control Principles, Terminologies, and Models
Identity and Access Management (IAM) Concepts
Lab Exercise:
Implementing Access Controls in Windows Machine
Managing Access Controls in Linux Machine
Implementing Role-Based Access Control in Windows Admin Center (WAC)
Module 03: Network Security Controls – Administrative Controls
Topics Covered:
Regulatory Frameworks, Laws, and Acts
Design and Develop Security Policies
Conduct Different Types of Security and Awareness Training
Lab Exercise:
Implementing Password Policies Using Windows Group Policy
Module 04: Network Security Controls – Physical Controls
Topics Covered:
Importance of Physical Security
Physical Security Controls
Workplace Security
Environmental Controls
Module 05: Network Security Controls – Technical Controls
Topics Covered:
Types of Network Segmentation
Types of Firewalls and their Role
Types of IDS/IPS and their Role
Types of Honeypots
Types of Proxy Servers and their Benefits
Fundamentals of VPN and its importance in Network Security
Security Incident and Event Management (SIEM)
User Behavior Analytics (UBA)
Antivirus/Anti-malware Software
Lab Exercise:
Implementing Host-Based Firewall Protection with iptables
Implementing Host-Based Firewall Functionality Using Windows Firewall
Implementing Network-Based Firewall Functionality: Blocking Unwanted Website access using pfSense Firewall
Implementing Network-Based Firewall Functionality: Blocking Insecure Ports using pfSense Firewall
Implementing Host-Based IDS functionality using Wazuh HIDS
Implementing Network-based IDS Functionality Using Suricata IDS
Detect Malicious Network Traffic using HoneyBOT
Establishing Virtual Private Network Connection using SoftEther VPN
Module 06: Virtualization and Cloud Computing
Topics Covered:
Virtualization Essential Concepts and OS
Virtualization Security
Cloud Computing Fundamentals
Insights of Cloud Security and Best Practices
Lab Exercise:
Auditing Docker Host Security Using Docker-Bench-Security Tool
Implementing AWS Identity and Access Management
Securing Amazon Web Services Storage
Module 07: Wireless Network Security
Topics Covered:
Wireless Network Fundamentals
Wireless Network Encryption Mechanisms
Types of Wireless Network Authentication Methods
Implement Wireless Network Security Measures
Lab Exercise:
Configuring Security on a Wireless Router
Module 08: Mobile Device Security
Topics Covered:
Mobile Device Connection Methods
Mobile Device Management Concepts
Common Mobile Usage Policies in Enterprises
Security Risks and Guidelines Associated with Enterprises Mobile Usage Policies
Implement Enterprise-level Mobile Security Management Solutions
Implement General Security Guidelines and Best Practices on Mobile Platforms
Lab Exercise:
Implementing Enterprise Mobile Security Using Miradore MDM Solution
Module 09: IoT Device Security
Topics Covered:
IoT Devices, Application Areas, and Communication Models
Security in IoT-enabled Environments
Lab Exercise:
Securing IoT Device Communication Using TLS/SSL
Module 10: Cryptography and PKI
Topics Covered:
Cryptographic Techniques
Cryptographic Algorithms
Cryptography Tools
Public Key Infrastructure (PKI)
Lab Exercise:
Calculate One-way Hashes using HashCalc
Calculate MD5 Hashes using HashMyFiles
Create a Self-signed Certificate
Module 11: Data Security
Topics Covered:
Data Security and its Importance
Security Controls for Data Encryption 8
Data Backup and Retention
Data Loss Prevention Concepts
Lab Exercise:
Perform Disk Encryption using VeraCrypt
File Recovery Using EaseUS Data Recovery Wizard
Backing Up and Restoring Data in Windows
Module 12: Network Traffic Monitoring
Topics Covered:
Need and Advantages of Network Traffic Monitoring
Determine Baseline Traffic Signatures for Normal and Suspicious Network Traffic
Perform Network Monitoring for Suspicious Traffic
Lab Exercise:
Capturing Network Traffic using Wireshark
Applying Various Filters in Wireshark
Analyzing and Examining Various Network Packet Headers in Linux using tcpdump
- Key issues plaguing network security.
- Essential network security protocols.
- Identification, authentication, and authorization concepts.
- Network security controls:
- Administrative controls (frameworks, laws, acts, and security policies).
- Physical controls (physical security controls, workplace security, and environmental controls).
- Technical controls (network segmentation, firewall, IDS/IPS, honeypot, proxy server, VPN, SIEM, UBA, and anti-malware).
- Fundamentals of virtualization, cloud computing, and cloud security.
- Wireless network fundamentals, wireless encryption, and security measures.
- Fundamentals of mobile and IoT devices and their security measures.
- Cryptography and PKI concepts.
- Data security, data encryption, and data backup and data loss prevention techniques.
- Network traffic monitoring for suspicious traffic.
- High School/ College/University students
Students, graduates, professionals, career starters and changers. High- school students who aspire to get an early start on their cybersecurity careers and master the fundamentals of security online.
- Teams and organizations
IT/technology/cybersecurity teams with little or no work experience.
- Career starters
College or University students interested in preparing for a cybersecurity career and aiding their IT education.
- Working professionals
Working professionals who are preparing to start with cybersecurity or switch to the field from another domain.
Training Details: Self-paced, in-demand lecture videos led by world-class instructors and hands-on labs.
Pre-requisite: No prior cybersecurity knowledge or IT work experience required.
Exam Details:
Exam Code: 112-51
Number of Questions: 75
Duration: 2 hours
Test Format: Multiple Choice