Paths

Network Defense (CND Prep)

Author: Daniel Lachance

Pluralsight is not an official partner or accredited training center of EC-Council. In this series, you will learn fundamental concepts of network security. This series teaches... Read more

Certified Network Defender (312-38)

In this series, you will learn fundamental concepts of network security. This series teaches the application of network security technologies as well as network security best practices such as vulnerability scanning and analysis, network security monitoring and incident detection and response. These courses can be used to prepare for the EC-Council® CND™ (Certified Network Defender) examination, with coverage of the 312-38 exam objectives.

Network Fundamentals and Protocols

by Daniel Lachance

Nov 22, 2016 / 1h 53m

1h 53m

Start Course
Description

Today's computing devices are always connected to a network. While increasing productivity, this also increases the risk of malicious activity. This course, Network Fundamentals and Protocols, begins by introducing you to network topologies and network equipment. Subsequently, you will learn about IPv4 and IPv6 addressing and protocols. Lastly, you will be introduced to the layers of computer network defense and secure network design. After finishing this course, you'll have an understanding of network hardware and software, and you'll be able to gain insights from captured network traffic.

Table of contents
  1. Course Overview1m
  2. Discovering Network Topologies and Equipment23m
  3. Exploring the TCP/IP Protocol Suite45m
  4. Configuring IPv4 and IPv628m
  5. Applying Computer Network Defense (CND)14m

Risks, Vulnerabilities, and Threats

by Daniel Lachance

Feb 3, 2017 / 1h 55m

1h 55m

Start Course
Description

One reason for security compromises is the lack of continuous monitoring to ensure assets are adequately protected. You need to know which organization assets require the most protection, but protection is only possible if you understand the threats. This course, Risks, Vulnerabilities, and Threats, will give you the skills needed to identify risks, to understand how malware and other malicious attacks are executed, and how to put effective security controls in place. When you're finished this course, you'll also know how to conduct periodic vulnerability scans in Windows and Linux to keep up with changing threats.

Table of contents
  1. Course Overview1m
  2. Analyzing Risk22m
  3. Mitigating Malware23m
  4. Attack Defense Tactics43m
  5. Conducting Vulnerability Assessments24m

Designing and Implementing Security Policies

by Daniel Lachance

Apr 19, 2017 / 2h 6m

2h 6m

Start Course
Description

Without IT security policies, organizations have no framework that defines the proper and safe use of IT systems and data. In this course, Designing and Implementing Security Policies, you'll be exposed to security standards bodies, and how to create security policies based on recommendations from these standards bodies. First, you'll learn examples of implementing security settings based on security policy documentation. Next, you'll learn how to determine the finer details of security policies, including the use of specific security controls and the consequences of policy non-compliance. Finally, you'll gain insight on how technical controls can be interpreted and then implemented for policy compliance. By the end of this course, you'll have an understanding of how policy documents are laid out, and how to design and implement security policies within business and regulatory requirements.

Table of contents
  1. Course Overview1m
  2. Identifying Security Standards and Bodies29m
  3. Designing Security Policies1h 2m
  4. Implementing Security Policies32m

Implementing Physical Security

by Daniel Lachance

Jun 27, 2017 / 1h 44m

1h 44m

Start Course
Description

Digital data assets are processed and stored on physical equipment housed in buildings. In this course, Implementing Physical Security, you'll become equipped with the necessary skills needed to ensure the security and availability of IT systems. First, you'll delve into how workplace policies have an impact on security. Next, you'll explore effective methods of securing a physical facility. Finally, you'll learn how important proper HVAC planning is for server rooms and data centers. When you're finished with this course, you'll have the skills and knowledge needed to apply effective physical and workplace security controls to an organization. Software required: EXO5, Windows Server 2016.

Table of contents
  1. Course Overview1m
  2. Identifying Workplace Security Issues43m
  3. Implementing Physical Security Controls39m
  4. Implementing Environmental Security Controls19m

Device Hardening

by Daniel Lachance

Sep 26, 2017 / 2h 29m

2h 29m

Start Course
Description

Hardening ensures IT systems comply with organizational security guidelines. In this course, Device Hardening, you'll acquire skills that will let you secure your IT environment. First, you'll explore how hardening applies to a wide variety of computing solutions. Next, you'll learn how to apply security requirements to harden network devices and hosts. Finally, you'll discover how to secure virtualization environments and application servers. When you're finished with this course, you'll have the skills and knowledge needed to properly harden your IT ecosystem. Software required: Microsoft Windows Server 2016, System Center Configuration Manager 2016, Red Hat Enterprise Linux 7.1, Amazon Web Services, and Microsoft Azure.

Table of contents
  1. Course Overview1m
  2. Hardening Network Infrastructure Devices35m
  3. Hardening Hosts36m
  4. Hardening Virtual Machine Environments32m
  5. Hardening File Systems and Applications43m

Network Access and Authentication

by Daniel Lachance

Nov 7, 2017 / 1h 33m

1h 33m

Start Course
Description

Preventing malware and malicious users from gaining access is the first line of defense to secure your IT environment. In this course, Network Access and Authentication, you'll learn how to control access to your network. First, you'll be introduced to authentication factors and access control models. Next, you'll explore authentication protocols and when they should be used. Finally, you'll discover how to implement network security from authentication through to authorization. By the end of this course, you'll know how to protect your digital assets with secure authentication mechanisms. Software required: Windows Server 2016 and Red Hat Enterprise Linux 7.

Table of contents
  1. Course Overview1m
  2. Authentication and Authorization 43m
  3. Authentication Protocols20m
  4. Securing Network Traffic 29m

Firewalls and Intrusion Detection

by Daniel Lachance

Feb 8, 2018 / 1h 42m

1h 42m

Start Course
Description

Malicious users and software continuously scan networks looking for vulnerable devices and hosts. In this course, Firewalls and Intrusion Detection, you'll acquire the ability to determine how various types of firewalls should be deployed in your specific environment. First, you'll discover how to implement an intrusion detection system to detect suspicious activity. Next, you'll learn how to determine between honeypots and honeynets. Finally, you'll explore how honeynets and honeypots can be used as IT system decoys to track intruder actions in order to learn how production systems should be hardened. When you have completed this course, you will have the skills to implement various types of firewalls for specific environments.

Table of contents
  1. Course Overview1m
  2. Firewall Concepts 48m
  3. IDS and IPS34m
  4. Honeypots18m

VPNs and Wireless Networks

by Daniel Lachance

Mar 12, 2018 / 1h 38m

1h 38m

Start Course
Description

There are various VPN, Wi-Fi, and Bluetooth configurations, some of which are more secure than others. In this course, VPNs and Wireless Networks, you'll gain the ability to configure these technologies while minimizing security risks. First, you'll learn about VPN types, configurations, and best practices. Next, you'll discover how to maximize Wi-Fi network usage and performance. Finally, you'll explore Wi-Fi and Bluetooth threats with hands-on experience cracking a WPA2 passphrase using a dictionary attack. When you're finished with this course, you'll have the skills and knowledge of various wireless networks needed to maximize your security.

Table of contents
  1. Course Overview1m
  2. Securing Virtual Private Networks49m
  3. Maximizing Wi-Fi Efficiency20m
  4. Implement Wireless Security27m

Network Monitoring and Analysis

by Daniel Lachance

Mar 28, 2018 / 1h 27m

1h 27m

Start Course
Description

Network scanning is performed by malicious users and IT security professionals. In this course, Network Monitoring and Analysis, you'll learn the fundamental knowledge of common network scans run by attackers so that you can detect this activity. First, you'll explore attack signatures, network monitoring techniques, and OS fingerprinting. Next, you'll learn about common TCP and UDP scan types and how ARP poisoning allows attackers to funnel traffic through their stations. Finally, you'll learn how to use the free, open source, Wireshark network analyzer to capture and analyze network traffic. When you're finished with this course, you will have the skills and knowledge of network monitoring needed to detect and protect against attackers.

Table of contents
  1. Course Overview1m
  2. Monitoring Network Activity30m
  3. Identifying Suspicious Network Activity22m
  4. Monitoring Network Activity Using Wireshark33m

Recovering from Trouble

by Daniel Lachance

Oct 3, 2018 / 1h 30m

1h 30m

Start Course
Description

Planning incident responses for negative incidents that affect IT systems can save time and money. In this course, Recovering from Trouble, you'll gain the knowledge required to plan an effective backup and restore strategy that minimizes risk and cost while maximizing data availability. First, you'll learn about data storage types and which is the best fit for a specific backup need. Next, you'll explore backup and restore types and when they should be used. Finally, you'll gain insight into how a structured approach to incident response not only minimizes downtime and costs, but also how it minimizes further current and future damage to IT systems and data.

Table of contents
  1. Course Overview1m
  2. Configuring Backup Storage39m
  3. Protecting and Recovering Data25m
  4. Responding to Incidents24m

What you will learn

  • Network defense fundamentals
  • Security risks, vulnerabilities, and threat types
  • Security controls, protocols, and devices
  • Security policy design and implementation
  • Physical security
  • Device hardening
  • Firewalls, VPNs, and wireless networks
  • Network monitoring and analysis
  • Incident response and management
  • Data backup and recovery

Pre-requisites

A strong understanding of basic networking concepts is required.