NDS: Fundamentals & Protocols

Network Defense Specialist banner


Course Description CEH

Course Description

The Network Defense Series from EC-Council | Press comprises of 5 books designed to educate learners from a vendor-neutral standpoint on how to defend the networks they manage. This series covers the fundamental skills in evaluating the internal and external threats to the network security and design, how to enforce the network level security policies, and how to ultimately protect an organization's information. The books in the series cover a broad range of topics from the secure network fundamentals, protocols & analysis, standards and policy, hardening infrastructure, configuring IPS, IDS, firewalls, bastion host, and honeypots. Learners completing this series will have a full understanding of the defensive measures taken to secure their organization's information and along with the proper experience; these books will prepare readers for the EC-Council Network Security Administrator (E|NSA) certification.

A thorough understanding of the network technologies and security fundamentals is required before designing any defensive measure to protect an organization's information. This book, the first in the series, is designed to provide the foundational knowledge to the potential security administrator from a vendor-neutral perspective covering everything from standard secure network topology, network media and transmission, classifications, and a complete view of the network security equipment.

This book discusses the operations of various key elements in a network, IP address assignments, Domain Name Spaces, working and functional categories of gateways, media types used to connect networks, media access methods, OSI and TCP/IP reference models, data transmission methods, logical network arrangements, network classes, physical arrangements of the network (including topologies), and network equipment functions.

 

 

Courseware - Network Defense Fundamentals & Protocols

 

Who Should Attend

This course will significantly benefit the security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

  • Duration: 2 days (9:00AM – 5:00PM)
  • CPE/ECE Qualification: 2 ECE Credits awarded for attendance (1 for each 8 hour class day)
  • Program Cost: $750 USD
  • Supplement Cost (Courseware & Certificate exam Access): $75 USD
  • Bundle Price: $799 USD
  • Getting Started: Find Training Click HERE
  • Corporate Trainers interested in setting up internal company training programs, click here

 

About us Icon

 

What’s included?

  • Physical Courseware
  • 1 year Access To EC-Council Student LMS for Practical Labs (if applicable), testing, and Certificate

Related Certificates:

  • Network Defense Specialist: Security Policy & Threats
  • Network Defense Specialist: Securing and Troubleshooting Network Operating Systems
  • Network Defense Specialist: Perimeter Defense Mechanisms
  • Network Defense Specialist: Security & Vulnerability Assessment

 


Course Briefing

Fundamentals of Network

A network is a group of computers connected together that allows information to be exchanged between the computers. It can be divided in several subnets depending on the usage and the requirements. This chapter introduces the key elements of a computer network and explores the devices used to connect to a network such as nodes, network backbone, segments, and subnets. It discusses the various data transmission methods, the network reference models, and network topologies. This chapter also discusses the logical network arrangements, network classes, physical arrangements of the network (including topologies), and network equipment functions.


 

 











Network protocols

Network protocols are rules and conventions for communication between network devices. Protocols for computer networking all generally use packet switching techniques to send and receive messages in the form of packets. A network protocol facilitates device identification and data transfer. This chapter describes the overview, functions of the network protocols, TCP/IP network classes, TELNET, application layer protocols, Light Weight Presentation Layer Protocol, session layer protocols, Reliable Data Protocol, User Datagram Protocol (UDP), routing protocols, and Data Link Layer protocols. This chapter also describes the implementation of Presentation Layer Protocols, Session Layer Protocols and Transport Layer Protocols.


 








Protocol Analysis

Protocol Analysis involves the identification of basic knowledge objects within a protocol, usually a transcript. This chapter describes the TCP/IP protocol suite which includes TCP/IP: Network Interface layer, Internet Layer, Transport Layer, and Application Layer. This chapter lists the TCP user commands such as open, send, receive, close, status and abort and explains the TCP algorithms. This chapter also discusses the problems related to TCP and other protocols.

 













IEEE Standards

The Institute of Electrical and Electronics Engineers (IEEE) is a non-profit organization. It is one of the leading professional associations for the advancement of technology. This chapter discusses the objectives of IEEE standards, IEEE 802 bridging and management, 802.2 Logical Link Control Layer, 802.3 CSMA/CD (Ethernet), 802.4 Token Passing Bus, 802.5 Token Ring Passing, 802.6 DQDB Access Method, and 802.7 Broadband LAN, 802.10 Security. This chapter also discusses the 802.11 Wireless LAN (WLAN), 802.12 Demand Priority Access, 802.15 Wireless Personal Area Network, 802.16 Broadband Wireless MAN (WMAN), 802.17 Resilient Packet Ring, wireless networking standards, and ETSI standards.

 

 

















Security Standard Organizations

Security standards enable organizations to practice security techniques to minimize the number of the successful security attacks. This chapter introduces the Internet Corporation for Assigned Names and Numbers, International Organization for Standardization, International Telecommunication Union and American National Standards Institute. This chapter also provides information on the Institute Of Electronics and Electrical Engineers (IEEE), Electronic Industries Association, National Institute for Standards and Technology, World Wide Web Consortium, and Web Application Security Consortium.

 

 





















Security Standards

The security standards support the businesses that take advantage of working with computers and electronic commerce on the Internet. Although there are more data security products and security services available today, the rapid growth in Internet technology also creates new opportunities for hackers and businesses. This chapter describes the Introduction to Internet Standards, Standards Creation Committee, and request for Comment Evolution, and Unshielded Twisted Pair (UTP) Categories. This chapter also discusses on how to obtain RFCs via File Transfer Protocol (FTP) and lists various cabling standards.