An Adaptive Security Strategy – Protect, Detect, Respond, and Predict Cybersecurity is a continuous, non-linear process. Therefore, your approach to mitigating cyber risks cannot be static. This is particularly important when the new "normal" has millions of employees working from remote locations on fragile, home-based WiFi networks and nonsanitized personal devices.
According to Gartner, traditional "prevent and detect" approaches are inadequate. Opportunistic by nature, malicious actors look for the easiest ways to attack the most users and siphon off the maximum gains. Developing a continuous Adaptive Security Cycle helps organizations stay ahead of cybercriminals by creating and improving security systems. Enter CND v2.
Created based on a thorough job task analysis CND v2 is based on the cybersecurity education framework and work role task analysis presented by the National Infocomm Competency Framework (NICF). The program is also mapped to the Department of Defense (DoD) roles for system/network administrators as well as global work roles and responsibilities laid out by the revised NICE Framework 2.0
Adaptive Security Strategy
CND v2 includes the Adaptive Security Strategy, thereby increasing the scope from Protect – Detect – Respond to Protect – Detect – Respond – Predict.
Increased Lab Time and Hands-On Focus
More than 50% of the CND v2 program is dedicated to practical skills in live ranges via EC-Council labs covering domains like Network Defense Management, Network Perimeter Protection, Endpoint Protection, Application and Data Protection, Enterprise Virtual, Cloud, and Wireless Network Protection, Incident Detection and Response, and Threat Prediction.
A Dedicated Module on IoT Security
IoT security, previously ignored, is now an issue of great concern. IoT devices are
not primarily designed with security in mind. This leaves serious vulnerabilities
while configuring IoT devices in a network. CND v2 introduces candidates to the various challenges that IoT devices pose and the measures required to mitigate them.
Network Virtualization Practices for the Remote Workforce Tracking security applications and configurations of remote work environments as workforce span across servers is very difficult. The CND v2 program teaches candidates to implement and manage the security of virtualization technologies Network Virtualization (NV), Software-Defined Network (SDN), Network Function Virtualization (NFV), OS Virtualization, Containers, Dockers, Kubernetes used in modern-day networks.
An Upgrade on Mobile Security Measures
Research firm Gartner predicts that by 2021, 27% of corporate data traffic will bypass perimeter security and flow directly from mobile and portable devices to the cloud. With the CND v2, you will learn Enterprise Mobile Device Security, Redefine Access Control Security, and other platforms to ensure that this endpoint remains secure.
Enhanced Focus on Cloud Security
While the adoption of cloud computing in organizations has increased, so have the challenges. Candidates will learn different ways to ensure security across various cloud platforms - AWS, Microsoft Azure Cloud, and Google Cloud Platform.
An Introduction to Threat Intelligence
Having a proactive approach to security is the new requirement of all organizations.
Without threat intelligence, your cybersecurity posture is only reactive. CND v2 helps you take a more effective, proactive approach using threat intelligence.
In−Depth Attack Surface Analysis
The key to cyber risk management is in-depth attack surface analysis. CND v2 trains you to identify what parts of your organization need to be reviewed and tested for security vulnerabilities, and how to reduce, prevent, and mitigate network risks.
Includes the Latest Technology
CND v2 covers the latest technologies such as Software Defined Network (SDN) security, Network Function Virtualization (NFV) security, container security, docker security, and Kubernetes security.