Ec-council | Learning
Defence Bases Network

Learn the basics of cybersecurity with The Essentials of Defense Network: network defense, data security, IoT and practical laboratory experience.
About Network Defense Essentials race
Course outline
Course outline:
- Fundamentals of network security
- Identification, authentication and authorisation
- Administrative checks
- Physical checks
- Technical inspections
- Virtualization and cloud computing
- Wireless network security
- Security of mobile devices
- Safety of IoT devices
- Cryptography and PKI
- Data security
- Network traffic monitoring
Objectives of the course
Programme description
This network defence training program addresses basic concepts of network security, access control principles, mobile device management and IoT, cryptography techniques and network surveillance to prepare participants for the challenges of modern computer security.
Basic concepts of network security +
- Discuss the principles of Information Insurance (IA) and the challenges of network defence.
- Review essential network security protocols and defence approaches.
- Discuss safety checks necessary for optimal protection.
Access controls and identity management +
- Discuss access control principles, terminology and models.
- Describe the concepts of Identity and Access Management (IAM).
- Review administrative controls, including security frameworks, laws and policies.
Physical and technical checks +
- Examine physical controls: physical safety, occupational safety, environmental controls.
- Examine technical controls such as network segmentation, firewalls, IDS/IPS, honeypots, proxy, VPN, SIEM, UBA and anti-malware solutions.
Virtualization and cloud security +
- Understand the basic concepts of virtualization and related security concerns.
- Discuss cloud computing and best security practices.
Wireless and mobile networks +
- Explain the basics of wireless networks and the different types of wireless encryption.
- Suggest wireless security measures.
- Discuss mobile device connection methods and mobile usage policies.
- Examine mobile security risks and best security practices for mobile platforms.
Safety of IoT devices +
- Discuss the operation and application areas of IoT devices.
- Understand IoT safety principles and safety considerations in the IoT framework.
- Identify best management and safety practices for IoT devices.
Cryptography and information protection +
- Discuss cryptography techniques and cryptographic algorithms.
- Understanding Public Key Infrastructure (PKI).
- Use various cryptography tools to protect information.
Data security +
- Understand the importance of data encryption.
- Discuss data loss prevention concepts.
- Compare different data backup technologies.
Network traffic monitoring +
- Discuss the need and benefits of network traffic monitoring.
- Determine the traffic signatures reference for normal and suspicious traffic.
- Conduct network surveillance to detect suspicious traffic.
Review
Success score
In order to maintain the high integrity of our certification exams, EC-Council exams are provided in several forms (i.e. different question banks). Each form is carefully analyzed by beta tests with an appropriate sample group under the supervision of a committee of experts in the field, who ensure that each of our examinations has not only academic rigour but also applicability in the "real world". We also have a process to determine the difficulty score for each question. The individual score then contributes to a global "Cut Score" for each form of examination. To ensure that each form has equal evaluation standards, cutting scores are established on a "by examination" basis. Depending on the form of examination contested, cutting scores can range from 60% to 78%.
Details of the examination
- Duration of examination 2 hours
- Format of the review : Multiple choice
- Review platform : ECC Exam Center
- Number of questions : 75
- Certification : Essentials in Network Defense
Roles
- Technical Support Technician
- Technical Support Officer
- Office Support Technician
- Cybercrime Analyst
- Cybersecurity Specialist
- Cyber Security Technician
- Office support
- Office Support Technician
- Network administrator
- Incident and intrusion analyst
- Information Security Officer
- Technical Network Specialist
- Specialist in digital forensics
- Intelligence Operations Officer
- Cybersecurity Operations Technician


