교육신청

공개건의

교육신청

간단한 정보를 입력하시면
요청하신 교육 비용을 안내해드립니다.

세미나 신청

간단한 정보를 입력하여
다양한 보안 세미나 등록이 가능합니다.

공개건의

인섹시큐리티 교육센터에
건의하고자 하는 내용을 전달해주세요!
내용은 철저하게 익명으로 전달됩니다.

  • >

컴퓨터 네트워크 전문가 자격증

CND 자격증

컴퓨터 네트워크 전문가

CND 교육과정

  • 구분 교육내용
    MODULE1
    Computer Network and Defense Fundamentals
    Network Fundamentals
    Network Components
    TCP/IP Networking Basics
    TCP/IP Protocol Stack
    IP Addressing
    Computer Network Defense (CND)
    CND Triad
    CND Process
    CND Actions
    CND Approaches
    MODULE2
    Network Security Threats, Vulnerabilities, and Attacks
    Essential Terminologies
    Network Security Concerns
    Network Security Vulnerabilities
    Network Reconnaissance Attacks
    Network Access Attacks
    Denial of Service (DoS) Attacks
    Distributed Denial-of-Service Attack (DDoS)
    Malware Attacks
    MODULE3
    Network Security Controls, Protocols, and Devices
    Fundamental Elements of Network Security
    Network Security Controls
    User Identification, Authentication, Authorization and Accounting
    Types of Authorization Systems
    Authorization Principles
    Cryptography
    Security Policy
    Network Security Devices
    Network Security Protocols
    MODULE4
    Network Security Policy Design and Implementation
    What is Security Policy?
    Internet Access Policies
    Acceptable-Use Policy
    User-Account Policy
    Remote-Access Policy
    Information-Protection Policy
    Firewall-Management Policy
    Special-Access Policy
    Network-Connection Policy
    Business-Partner Policy
    Email Security Policy
    Passwords Policy
    Physical Security Policy
    Information System Security Policy
    Bring Your Own Devices (BYOD) Policy
    Software/Application Security Policy
    Data Backup Policy
    Confidential Data Policy
    Data Classification Policy
    Internet Usage Policies
    Server Policy
    Wireless Network Policy
    Incidence Response Plan (IRP)
    User Access Control Policy
    Switch Security Policy
    Intrusion Detection and Prevention (IDS/IPS) Policy
    Personal Device Usage Policy
    Encryption Policy
    Router Policy
    Security Policy Training and Awareness
    ISO Information Security Standards
    Payment Card Industry Data Security Standard (PCI-DSS)
    Health Insurance Portability and Accountability Act (HIPAA)
    Information Security Acts: Sarbanes Oxley Act (SOX)
    Information Security Acts: Gramm-Leach-Bliley Act (GLBA)
    Information Security Acts: The Digital Millennium Copyright Act (DMCA) and Federal
    Information Security Management Act (FISMA)
    Other Information Security Acts and Laws
    MODULE5
    Physical Security
    Physical Security
    Access Control Authentication Techniques
    Physical Security Controls
    Other Physical Security Measures
    Workplace Security
    Personnel Security: Managing Staff Hiring and Leaving Process
    Laptop Security Tool: EXO5
    Environmental Controls
    Physical Security: Awareness /Training
    Physical Security Checklists
    MODULE6
    Host Security
    Host Security
    OS Security
    Linux Security
    Securing Network Servers
    Hardening Routers and Switches
    Application/software Security
    Data Security
    Virtualization Security
    MODULE7
    Secure Firewall Configuration and Management
    Firewalls and Concerns
    What Firewalls Does?
    What should you not Ignore?: Firewall Limitations
    How Does a Firewall Work?
    Firewall Rules
    Types of Firewalls
    Firewall Technologies
    Firewall Topologies
    Firewall Rule Set & Policies
    Firewall Implementation
    Firewall Administration
    Firewall Logging and Auditing
    Firewall Anti-evasion Techniques
    Why Firewalls are Bypassed?
    Full Data Traffic Normalization
    Data Stream-based Inspection
    Vulnerability-based Detection and Blocking
    Firewall Security Recommendations and Best Practices
    Firewall Security Auditing Tools
    MODULE8
    Secure IDS Configuration and Management
    Intrusions and IDPS
    IDS
    Types of IDS Implementation
    IDS Deployment Strategies
    Types of IDS Alerts
    IPS
    IDPS Product Selection Considerations
    IDS Counterparts
    MODULE9
    Secure VPN Configuration and Management
    Understanding Virtual Private Network (VPN)
    How VPN works?
    Why to Establish VPN ?
    VPN Components
    VPN Concentrators
    Types of VPN
    VPN Categories
    Selecting Appropriate VPN
    VPN Core Functions
    VPN Technologies
    VPN Topologies
    Common VPN Flaws
    VPN Security
    Quality Of Service and Performance in VPNs
    MODULE10
    Wireless Network Defense
    Wireless Terminologies
    Wireless Networks
    Wireless Standard
    Wireless Topologies
    Typical Use of Wireless Networks
    Components of Wireless Network
    WEP (Wired Equivalent Privacy) Encryption
    WPA (Wi-Fi Protected Access) Encryption
    WPA2 Encryption
    WEP vs. WPA vs. WPA2
    Wi-Fi Authentication Method
    Wi-Fi Authentication Process Using a Centralized Authentication Server
    Wireless Network Threats
    Bluetooth Threats
    Wireless Network Security
    Wi-Fi Discovery Tools
    Locating Rogue Access points
    Protecting from Denial-of-Service Attacks: Interference
    Assessing Wireless Network Security
    Wi-Fi Security Auditing Tool: AirMagnet WiFi Analyzer
    WPA Security Assessment Tool
    Wi-Fi Vulnerability Scanning Tools
    Deploying Wireless IDS (WIDS) and Wireless IPS (WIPS)
    WIPS Tool
    Configuring Security on Wireless Routers
    Additional Wireless Network Security Guidelines
    MODULE11
    Network Traffic Monitoring and Analysis
    Network Traffic Monitoring and Analysis(Introduction)
    Network Monitoring: Positioning your Machine at Appropriate Location
    Network Traffic Signatures
    Packet Sniffer: Wireshark
    Detecting OS Fingerprinting Attempts
    Detecting PING Sweep Attempt
    Detecting ARP Sweep/ ARP Scan Attempt
    Detecting TCP Scan Attempt
    Detecting SYN/FIN DDOS Attempt
    Detecting UDP Scan Attempt
    Detecting Password Cracking Attempts
    Detecting FTP Password Cracking Attempts
    Detecting Sniffing (MITM) Attempts
    Detecting the Mac Flooding Attempt
    Detecting the ARP Poisoning Attempt
    Additional Packet Sniffing Tools
    Network Monitoring and Analysis
    Bandwidth Monitoring
    MODULE12
    Network Risk and Vulnerability Management
    What is Risk?
    Risk Levels
    Risk Matrix
    Key Risk Indicators(KRI)
    Risk Management Phase
    Enterprise Network Risk Management
    Vulnerability Management
    MODULE13
    Data Backup and Recovery
    Introduction to Data Backup
    RAID (Redundant Array Of Independent Disks) Technology
    Storage Area Network (SAN)
    Network Attached Storage (NAS)
    Selecting Appropriate Backup Method
    Choosing the Right Location for Backup
    Backup Types
    Conducting Recovery Drill Test
    Data Recovery
    Windows Data Recovery Tool
    RAID Data Recovery Services
    SAN Data Recovery Software
    NAS Data Recovery Services
    MODULE14
    Network Incident Response and Management
    Incident Handling and Response
    Incident Response Team Members: Roles and Responsibilities
    First Responder
    Incident Handling and Response Process
    Overview of IH&R Process Flow