Contattaci Richiedi un contatto telefonico



Practical Network Defense

Ti interessa questo corso?

Iscriviti per ottenere l'accesso al nostro materiale formativo e ai laboratori!

Extremely Hands-on

Practice Network defense against real world attacks. PND includes the most sophisticated virtual lab on IT Security: Hera Lab

Discover Labs

Become Certified

Obtain the eNDP certification and prove your practical skills with the only 100% practical certification on Network Defense

Discover eNDP

Dai un'occhiata al corso

  • Close the gap between Network attack and defense
  • Teaches defense which is valuable for both the defense team and offense team
  • Full practical setup guides
  • Configuration features to control, identify and prevent threats
  • Secure network design concepts and configuration of network appliances
  • 10 different lab scenarios to practice with
  • Configure secure remote access with practical examples
  • Windows configuration policies, domains, AD and much more
  • After obtaining the eNDP certification qualifies you for 40 CPE

Materiale del corso

  • 5+ hours of HQ video training material
  • 1500+ slides
  • 10 labs in Hera

Fruizione del corso

  • Self-paced / HTML5, PDF, MP4
  • Off-line access available
  • Access from PC, Tablet and Smartphone

Prova il corso gratuitamente

Confermo di voler ricevere email da parte di Caendra Inc.


  • Modulo 1 : Introduction

    In this module, you will learn the basics of information security, including the ‘why’ and a lot of the associated vocabulary.

  • Modulo 2 : TCP

    How TCP works is a very important concept to understand. This module covers the OSI/TCP models, the connections themselves and how you can explore live connections yourself with Wireshark.

  • Modulo 3 : Attacks

    As Sun Tzu said, “know your enemy”. This module explains some of the attack vectors you will be dealing with when it comes to defending your network. This module concludes in a full scenario of a company’s network being compromised.

  • Modulo 4 : Perimeter Appliances

    In this module, you will learn the majority of the network security appliances in use today.

  • Modulo 5 : Secure network Design - Part I

    One of the most important fundamental topics when it comes to securing a network is the design and topology of the network. This module will teach you the considerations and strategies used when planning for a secure network.

  • Modulo 6 : Firewall configuration - Part I

    When it comes to the perimeter or network segmentation, the firewall is an integral technology. In this module, you will look at configuring a firewall appliance from start to finish with focus on the ACL. This module also covers some of the Next Generation Firewall features such as application identification, IPS and web filtering.

  • Modulo 7 : Firewall configuration - Part II

    Some of today’s firewalls and other network security appliances are including advanced features to allow you to secure your network even more. This module will show you some of these features to help you control, identify and prevent threats.

  • Modulo 8 : Secure network design - Part II

    The first module introduced you to secure network design and this module will expand upon that topic. You will learn more on network segmentation at both the layer 3 and layer 2 levels.

  • Modulo 9 : VPN

    Providing secure remote access is becoming a very common requirement these days whether it is a site to site tunnel or remote access for your mobile workforce. This module will teach you what you need to know about both as well as walk you through practical examples of deploying them.

  • Modulo 10 : Switch configuration

    Switches are often overlooked in the security plan but can provide additional security at layer two. This module will look at setting up a switch, hardening the device itself and setting up many layer 2 security layers.

  • Modulo 11 : System Security

    This module introduces you to some of the core topics with regard to system security. It covers the basics of the technologies and strategies in involved in every endpoint protection plan.

  • Modulo 12 : Active Directory

    The foundation for any Windows network is Active Directory. It takes care of your access control, manage users and groups, and set policies to control and harden your Windows domain-joined computers/servers via Group Policy. Finally, we will cover Active Directory Certificate Services and how to set it up correctly so you can implement a PKI.

  • Modulo 13 : WSUS

    As you will learn in this course and may already know, patch management is essential to keeping your systems safe. This module will teach you how to setup and manage Windows Server Update Services so you can control and monitor the Windows patch levels in your environment.

  • Modulo 14 : Microsoft EMET

    Vulnerabilities and exploits are growing exponentially. Signature-based IDS/IPS is the most efficient method to prevent attacks so you will learn about Microsoft EMET which makes a successful exploit much more “expensive” for the attacker. This program also helps to keep your network safer in the zero-day window when no patch is available for a given program or operating system.

  • Modulo 15 : Group Policy Revisited

    This first Active Directory module provided an introduction to Group Policy. In this module, we will take a look at several more Group Policy examples to show you some ways you can secure your Windows endpoints

  • Modulo 16 : Endpoint Security

    The first module introduced many of the endpoint security topics. This module will take a deeper dive into endpoint security and some of the specific things you should consider in your strategy. You will also see a couple attacks and see practical mitigations for preventing them.

  • Modulo 17 : Printers

    Printers are usually overlooked yet sensitive information is usually sent to the printer via print or fax capabilities. In addition, many of today’s printers run on a Linux kernel and are sometimes used as pivot points in attacks. This module will teach you the settings you need to configure to harden every printer on your network.

  • Modulo 18 : Vulnerabilities

    An important part of any security program is vulnerability management. This module will teach you the steps of a vulnerability management program including port scans, vulnerability scans, reporting and remediation.

  • Modulo 19 : Controlling Vendor Access

    Understanding the need to give your vendors secure access to your network while protecting your network from their connection is crucial; many of the attacks over the past few years have stemmed from vendors being compromised and the attackers using the vendor’s remote access to pivot deeper into their target’s network. This module will look at some important things to consider with regard to vendor management and how to secure yourself against unwanted activity.

Scarica il Syllabus in PDF


  • Basic understanding of networking: TCP/IP, Routing
  • Basic understanding of IT Security matters
  • Intermediate understanding of the Windows operating system

Questo corso di formazione è per...

  • System/Network Administrators
  • Penetration testers
  • IT admins and staff


Each lab is associated with a chapter from the course and will provide you with misconfigured or vulnerable network design. You are expected to find security issues, fix them and verify that the patches applied work.

Each lab comes with a manual that walks you through the steps to take.

Lab IDDescrizioneCategoria
Lab 1 Active Directory-Basic User Management and Group Policy with Active Directory Network Defense
Lab 2 Active Directory Certificate Services-Setting up PKI with A.D. Certificate Services Network Defense
Lab 3 WSUS-Patching Windows with WSUS Network Defense
Lab 4 EMET-Protecting Windows with EMET System Defense
Lab 5 Group Policy Network Defense
Lab 6 Endpoint Network Defense
Lab 7 Vulnerabilites-Business Logic Flaws Network Defense
Lab 8 Remediation-Vulnerability Remediation Network Defense
Lab 9 ACL-Configuring ACLs on Firewalls Network Defense
Lab 10 OpenVPN-Configuring OpenVPN on pfSense Network Defense


Get the eNDP Certification

The eNDP designation stands for eLearnSecurity Network Defense Professional. eNDP is 100% practical and is issued to security engineers who provide proof of their hands-on skills through a comprehensive practical exam.

Ulteriori informazioni


  • Schuyler Dorsey
    Schuyler Dorsey

    Schuyler Dorsey is a Systems and Security engineer who works in the I.T. consulting field. He has several years of experience, an M.S. in Information Security & Assurance, and several security certifications under his belt. He routinely performs vulnerability assessments, penetration tests, security auditing and also works on the defensive side and helps clients secure their endpoints & networks.

Iscriviti per ottenere l'accesso al nostro materiale formativo e ai laboratori!

Torna in cima