EC-Council Network Defense Essentials


Network Defense Essentials is a first-of-its-kind MOOC certification that provides foundational knowledge and skills in network security with add-on labs for handson experience. The course includes 12 modules and optional upgrades to lab ranges covering fundamental network security concepts, including IoT, cryptography, and PKI.


Who should attend

EC-Council’s Essentials Series programs and certifications build and validate candidates’ skills for their cybersecurity future. It is ideal for IT professionals who are seeking to foray into the exciting world of cybersecurity. Cybersecurity enthusiasts and students will readily find the program interesting, challenging, and useful.

Course Objectives

EC-Council’s Essentials Series is the first MOOC certification course series covering essential skills in network defense, ethical hacking, and digital forensics. The Network Defense Essentials (N|DE), Ethical Hacking Essentials (E|HE), and Digital Forensics Essentials (D|FE) are foundational programs that help students and early career professionals choose their area of competency or select a specific interest in cybersecurity. The Essentials Series was designed to give students the foundation on which to build and develop the essential skills for tomorrow’s careers in cybersecurity. These programs educate learners in a range of techniques across industry verticals, such as securing networks, mitigating cyber risks, conducting forensic investigations, and more.


Network Security Fundamentals

  • Fundamentals of network security
  • Network security protocols that govern the flow of data

Identification, Authentication, and Authorization

  • Access control principles, terminologies, and models
  • Identity and access management (IAM)

Network Security Controls: Administrative Controls

  • Regulatory frameworks, laws, and acts
  • Security policies, and how to conduct security and awareness training

Network Security Controls: Physical Controls

  • Importance of physical security and physical security controls
  • Physical security policies and procedures
  • Best practices to strengthen workplace security
  • Environmental controls

Network Security Controls: Technical Controls

  • Types of bastion hosts and their role in network security
  • IDS/IPS types and their role in network defense
  • Types of honeypots and virtual private networks (VPNs)
  • Security incident and event management (SIEM)

Virtualization and Cloud Computing

  • Key concepts of virtualization and OS virtualization security
  • Cloud computing fundamentals and cloud deployment models
  • Cloud security best practices

Wireless Network Security

  • Fundamentals of wireless networks and encryption mechanisms
  • Wireless network authentication methods
  • Implementing wireless network security measures

Mobile Device Security

  • Mobile device connection methods and management
  • Mobile use approaches in enterprises
  • Security risks and guidelines associated with enterprise mobile usage policies
  • Implement various enterprise-level mobile security management solutions
  • Best practices on mobile platforms

IoT Device Security

  • IoT devices, application areas, and communication models
  • How security works in IoT-enabled environments

Cryptography and PKI

  • Cryptographic tools, security techniques, and algorithms
  • Public key infrastructure (PKI) to authenticate users and devices in the digital world

Data Security

  • Data security and its importance
  • Security controls for data encryption
  • Perform data backup and retention
  • Implement data loss prevention concepts

Network Traffic Monitoring

  • Network traffic monitoring concepts.
  • Traffic signatures for normal and suspicious network traffic.
  • Perform network monitoring to detect suspicious traffic.

Price on request