Network Defense Essentials covers the fundamental concepts of information security and network defense. This introductory cybersecurity course is designed for today’s entry-level information security or cybersecurity careers and is ideal for learners aspiring to pursue a career in cybersecurity.
The course gives a holistic overview of the key components of Information Security such as Identification, Authentication and Authorization, Virtualization and Cloud Computing, Wireless Networks, Mobile and IoT Devices, and Data Security. The interactive labs component of this course ensures that learners receive the hands-on, practical experience required for a future in cybersecurity.
NDE-certified learners have an assured means of formal recognition to add to their resumes and show off their expertise and skills to prospective employers. The purpose of the NDE certification is to recognize the competency and expertise of a professional in network defense and information security skills, thereby adding value to their workplace and employer.
What you will learn
Module 01: Network Security Fundamentals
With the increase in the usage of emerging technology, it has become increasingly important to secure information and data being processed online. As the Internet and computer networks are continually growing, network security has become a challenging task for organizations. This module provides insight into the network security fundamentals, such as network defense approaches, network security controls, network security protocols, etc.
Module 02: Identification, Authentication, and Authorization
The most serious risk that organizations are facing today is unauthorized access to sensitive data. To control such data breaches, organizations require strong identification, authentication, and authorization mechanisms to effectively manage access to critical assets and sensitive data. This module provides an overview of various methods and techniques used for the identification, authentication, and authorization of users accessing critical assets and resources.
Module 03: Network Security Controls – Administrative Controls
Compliance, policies, and governance are integral to an information security program for any organization. An organization needs to comply with certain regulatory standards to run its businesses. At the same time, it must also have strong security policies and governance in order to fulfill regulatory standards. The current module addresses this administrative aspect of an organization’s network security.
Module 04: Network Security Controls – Physical Controls
Physical security plays a major role in every organization. It entails the protection of critical information, network infrastructure, physical equipment and devices, facilities, personnel, etc. from environmental disasters, terrorism, vandalism, and theft. This module explains the importance of physical security, various physical security controls, importance of workplace security, and various environmental controls.
Module 05: Network Security Controls – Technical Controls
The most important aspect of security controls is the protection of organizational assets such as people, property, and data. By establishing security controls, an organization can either reduce or completely mitigate risks to their assets. This module provides an overview of various technical controls that help organizations in protecting their private networks and IT assets.
Module 06: Virtualization and Cloud Computing
Cloud computing is an emerging technology that delivers computing services such as online business applications, online data storage, and webmail over the Internet. Cloud implementation enables a distributed workforce, reduces organization expenses, provides data security, etc. This module provides an overview of virtualization and cloud computing concepts that help organizations securely store or process data on the cloud.
Module 07: Wireless Network Security
This module deals with network security for wireless networks in enterprises. Wireless networks are widely used across organizations today and are prone to various attacks. Therefore, organizations need to focus on the planning for securing the wireless network across the organization.
Module 08: Mobile Device Security
With the introduction of mobile phones in enterprises, enterprise security has become more complex. Enterprise mobile security has become a major challenge for organizations. Therefore, it is important for organizations to address these security concerns to effectively manage the security of mobile devices. This module provides an overview of mobile device security risks and best practices for mobile platforms.