Training with Iverson classes

Training is not a commodity – all training centres are not the same. Iverson Associates Sdn Bhd is the most established, the most reputable, and the top professional IT training provider in Malaysia. With a large pool of experienced and certified trainers, state-of-the-art facilities, and well-designed courseware, Iverson offers superior training, a more impactful learning experience and highly effective results.

At Iverson, our focus is on providing high-quality IT training to corporate customers, meeting their learning needs and helping them to achieve their training objectives. Iverson has the flexibility to provide training solutions whether for a single individual or the largest corporation in a well-paced or accelerated training programme.

Our courses continue to evolve along with the fast-changing technological advances. Our instructor-led training services are available on a public and a private (in-company) basis. Some of our courses are also available as online, on demand, and hybrid training.

The CND certification aims to equip you with hands-on training to function in real life situations involving network defense. You will gain the technical skills required to proactively design a secure network with future threats in mind. This program will be akin to learning math instead of just using a calculator.

This program will be akin to learning math instead of just using a calculator. This program teaches a fundamental understanding of the true construct of data transfer, network technologies, and software technologies so that you understand how networks operate, the processes software is automating, and how to analyze the subject material.

You will learn how to mitigate, harden, and defend from the attacks. You will learn network defense fundamentals, the application of network security controls, protocols, perimeter appliances, secure IDS, VPN, and firewall configuration. You will then learn the intricacies of network traffic signature, analysis and vulnerability scanning which will help you when you design greater network security policies and successful incident response plans. These skills will help you foster resiliency and continuity of operations during attacks.

What typical students would benefit most from this class?

  • System Administrators
  • System Engineers
  • Firewall Administrators
  • Network Managers
  • IT Managers
  • IT Professionals
  • Anyone interested in network Security technologies
  • Managers who want to understand cyber security core principles and practices
  • Operations personnel, who although do not have security as their primary job function, need an understanding of cyber security core principles and practices

Additional Info

  • Certification Course & Certificate
  • Course Code CND
  • Price RM5000
  • Exam Price Include
  • Exam Code 312-38
  • Duration 5 Days
  • CertificationInfo Certified Network Defender (CND)
  • Principals EC-Council
  • Schedule

    13-17 Jan 2020

    16-20 Mar 2020

    13-17 Mar 2020 (Penang)

    1-5 Jun 2020

    20-24 Jul 2020

    21-25 Sep 2020

    2-6 Nov 2020

    23-27 Nov 2020 (Penang)

  • Module 1 Title Computer Network Defense Fundamentals
  • Module 1 Content
    • Network Fundamentals
    • Network Components
    • TCP/IP Networking Basics
    • TCP/IP Protocol Stack
    • IP Addressing
    • Computer Network Defense (CND)
    • CND Triad
    • CND Process
    • CND Actions
    • CND Approaches
  • Module 2 Title Network Security Threats, Vulnerabilities, and Attacks
  • Module 2 Content
    • Essential Terminologies
    • Network Security Concerns
    • Network Security Vulnerabilities
    • Network Reconnaissance Attacks
    • Network Access Attacks
    • Denial of Service (DoS) Attacks
    • Distributed Denial-of-Service Attack (DDoS)
    • Malware Attacks
  • Module 3 Title Network Security Controls, Protocols, and Devices
  • Module 3 Content
    • Fundamental Elements of Network Security
    • Network Security Controls
    • User Identification, Authentication, Authorization and Accounting
    • Types of Authorization Systems
    • Authorization Principles
    • Cryptography
    • Security Policy
    • Network Security Devices
    • Network Security Protocols
  • Module 4 Title Network Security Policy Design and Implementation
  • Module 4 Content
    • What is Security Policy?
    • Internet Access Policies
    • Acceptable-Use Policy
    • User-Account Policy
    • Remote-Access Policy
    • Information-Protection Policy
    • Firewall-Management Policy
    • Special-Access Policy
    • Network-Connection Policy
    • Business-Partner Policy
    • Email Security Policy
    • Passwords Policy
    • Physical Security Policy
    • Information System Security Policy
    • Bring Your Own Devices (BYOD) Policy
    • Software/Application Security Policy
    • Data Backup Policy
    • Confidential Data Policy
    • Data Classification Policy
    • Internet Usage Policies
    • Server Policy
    • Wireless Network Policy
    • Incidence Response Plan (IRP)
    • User Access Control Policy
    • Switch Security Policy
    • Intrusion Detection and Prevention (IDS/IPS) Policy
    • Personal Device Usage Policy
    • Encryption Policy
    • Router Policy
    • Security Policy Training and Awareness
    • ISO Information Security Standards
    • Payment Card Industry Data Security Standard (PCI-DSS)
    • Health Insurance Portability and Accountability Act (HIPAA)
    • Information Security Acts: Sarbanes Oxley Act (SOX)
    • Information Security Acts: Gramm-Leach-Bliley Act (GLBA)
    • Information Security Acts: The Digital Millennium Copyright Act (DMCA) and Federal Information Security Management Act (FISMA)
    • Other Information Security Acts and Laws
  • Module 5 Title Physical Security
  • Module 5 Content
    • Physical Security
    • Access Control Authentication Techniques
    • Physical Security Controls
    • Other Physical Security Measures
    • Workplace Security
    • Personnel Security: Managing Staff Hiring and Leaving Process
    • Laptop Security Tool: EXO5
    • Environmental Controls
    • Physical Security: Awareness /Training
    • Physical Security Checklists
  • Module 6 Title Host Security
  • Module 6 Content
    • Host Security
    • OS Security
    • Linux Security
    • Securing Network Servers
    • Hardening Routers and Switches
    • Application/software Security
    • Data Security
    • Virtualization Security
  • Module 7 Title Secure Firewall Configuration and Management
  • Module 7 Content
    • Firewalls and Concerns
    • What Firewalls Does?
    • What should you not Ignore?: Firewall Limitations
    • How Does a Firewall Work?
    • Firewall Rules
    • Types of Firewalls
    • Firewall Technologies
    • Firewall Topologies
    • Firewall Rule Set & Policies
    • Firewall Implementation
    • Firewall Administration
    • Firewall Logging and Auditing
    • Firewall Anti-evasion Techniques
    • Why Firewalls are Bypassed?
    • Full Data Traffic Normalization
    • Data Stream-based Inspection
    • Vulnerability-based Detection and Blocking
    • Firewall Security Recommendations and Best Practices
    • Firewall Security Auditing Tools
  • Module 8 Title Secure IDS Configuration and Management
  • Module 8 Content
    • Intrusions and IDPS
    • IDS
    • Types of IDS Implementation
    • IDS Deployment Strategies
    • Types of IDS Alerts
    • IPS
    • IDPS Product Selection Considerations
    • IDS Counterparts
  • Module 9 Title Secure VPN Configuration and Management
  • Module 9 Content
    • Understanding Virtual Private Network (VPN)
    • How VPN works?
    • Why to Establish VPN ?
    • VPN Components
    • VPN Concentrators
    • Types of VPN
    • VPN Categories
    • Selecting Appropriate VPN
    • VPN Core Functions
    • VPN Technologies
    • VPN Topologies
    • Common VPN Flaws
    • VPN Security
    • Quality Of Service and Performance in VPNs
  • Module 10 Title Wireless Network Defense
  • Module 10 Content
    • Wireless Terminologies
    • Wireless Networks
    • Wireless Standard
    • Wireless Topologies
    • Typical Use of Wireless Networks
    • Components of Wireless Network
    • WEP (Wired Equivalent Privacy) Encryption
    • WPA (Wi-Fi Protected Access) Encryption
    • WPA2 Encryption
    • WEP vs. WPA vs. WPA2
    • Wi-Fi Authentication Method
    • Wi-Fi Authentication Process Using a Centralized Authentication Server
    • Wireless Network Threats
    • Bluetooth Threats
    • Wireless Network Security
    • Wi-Fi Discovery Tools
    • Locating Rogue Access points
    • Protecting from Denial-of-Service Attacks: Interference
    • Assessing Wireless Network Security
    • Wi-Fi Security Auditing Tool: AirMagnet WiFi Analyzer
    • WPA Security Assessment Tool
    • Wi-Fi Vulnerability Scanning Tools
    • Deploying Wireless IDS (WIDS) and Wireless IPS (WIPS)
    • WIPS Tool
    • Configuring Security on Wireless Routers
    • Additional Wireless Network Security Guidelines
  • Module 11 Title Network Traffic Monitoring and Analysis
  • Module 11 Content
    • Network Traffic Monitoring and Analysis(Introduction)
    • Network Monitoring: Positioning your Machine at Appropriate Location
    • Network Traffic Signatures
    • Packet Sniffer: Wireshark
    • Detecting OS Fingerprinting Attempts
    • Detecting PING Sweep Attempt
    • Detecting ARP Sweep/ ARP Scan Attempt
    • Detecting TCP Scan Attempt
    • Detecting SYN/FIN DDOS Attempt
    • Detecting UDP Scan Attempt
    • Detecting Password Cracking Attempts
    • Detecting FTP Password Cracking Attempts
    • Detecting Sniffing (MITM) Attempts
    • Detecting the Mac Flooding Attempt
    • Detecting the ARP Poisoning Attempt
    • Additional Packet Sniffing Tools
    • Network Monitoring and Analysis
    • Bandwidth Monitoring
  • Module 12 Title Network Risk and Vulnerability Management
  • Module 12 Content
    • What is Risk?
    • Risk Levels
    • Risk Matrix
    • Key Risk Indicators(KRI)
    • Risk Management Phase
    • Enterprise Network Risk Management
    • Vulnerability Management
  • Module 13 Title Data Backup and Recovery
  • Module 13 Content
    • Introduction to Data Backup
    • RAID (Redundant Array Of Independent Disks) Technology
    • Storage Area Network (SAN)
    • Network Attached Storage (NAS)
    • Selecting Appropriate Backup Method
    • Choosing the Right Location for Backup
    • Backup Types
    • Conducting Recovery Drill Test
    • Data Recovery
    • Windows Data Recovery Tool
    • RAID Data Recovery Services
    • SAN Data Recovery Software
    • NAS Data Recovery Services
  • Module 14 Title Network Incident Response and Management
  • Module 14 Content
    • Incident Handling and Response
    • Incident Response Team Members: Roles and Responsibilities
    • First Responder
    • Incident Handling and Response Process
    • Overview of IH&R Process Flow
RM5,000.00(+RM300.00 Tax)
* Training Dates:

QRadar SIEM provides deep visibility into network, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, assets, and vulnerabilities. Suspected attacks and policy breaches are highlighted as offenses. In this course, you learn to navigate the user interface and how to investigate offenses. You search and analyze the information from which QRadar SIEM concluded a suspicious activity. Hands-on exercises reinforce the skills learned.

Learning Journeys or Training Paths that reference this course:

  • Security Solutions Foundation

Additional Info

  • Certification Course only
  • Course Code BQ103
  • Price RM5700
  • Exam Price Exclude
  • Duration 3 Days
  • Principals IBM
  • Schedule

    23-25 Mar 2020

    27-29 Jul 2020

  • Audience

    This basic course is suitable for security analysts, security technical architects, offense managers, network administrators, and system administrators.

  • Prerequisities

    You must have:

    • Basic TCP/IP networking skills
    • System administration knowledge
    • Basic information security skills
  • At Course Completion
    • Describe the purpose and capabilities of the QRadar SIEM licensed program
    • Describe how QRadar SIEM collects data and performs vulnerability assessment
    • Learn how to navigate and customize the dashboard tab
    • Learn how to investigate the information contained in an offense and respond to an offense
    • Learn  how to find, filter, and group events in order to gain critical insights about the offense
    • Learn how to create and edit a search that monitors the events of suspicious hosts
    • Learn  how asset profiles are created and updated, and how to use them as part of an offense investigation
    • Learn how to investigate the flows that contribute to an offense, create and tune false positives, and investigate superflows
    • Learn  how to find custom rules in the QRadar SIEM console, assign actions and responses to the rule, and how to configure rules
    • Learn how to use charts and apply advanced filters to examine specific activities in your environment
  • Module 1 Title Introduction to IBM Security QRadar SIEM
  • Module 2 Title How QRadar SIEM collects security data
  • Module 3 Title Using the QRadar SIEM Dashboard
  • Module 4 Title Investigating an offense that is triggered by events
  • Module 5 Title Investigating the events of an offense
  • Module 6 Title Using asset profiles to investigate offenses
  • Module 7 Title Investigating an offense that is triggered by flows
  • Module 8 Title Using rules and building blocks
  • Module 9 Title Creating QRadar SIEM reports
  • Module 10 Title Performing advanced filtering
RM5,700.00(+RM342.00 Tax)
* Training Dates:

Page 2 of 2

PMP, Project Management Professional (PMP), CAPM, Certified Associate in Project Management (CAPM) are registered marks of the Project Management Institute, Inc.

We are using cookies to give you the best experience on our site. By continuing to use our website without changing the settings, you are agreeing to use of cookies.
Ok Decline