Cyber security courses in Kerala , kochi

amallblitz0 22 views 14 slides Feb 10, 2024
Slide 1
Slide 1 of 14
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14

About This Presentation

Secure your future with the best cyber security course in Kerala and Kochi. Enroll now for comprehensive training and practical experience.


Slide Content

CERTIFIED NETWORK DEFENDER 01CERTIFIED NETWORK DEFENDER 01
CERTIFIED NETWORK DEFENDER
Protect. Detect. Respond. Predict.
Certified
D
NetworkDefender
NC
TM

CERTIFIED NETWORK DEFENDER 02
¶ØåçÜØ×ÁØçêâåÞ·ØÙØáרåé¥
ÇÛØâáßìçåèØÕßèØçØÔàáØçêâåÞ×ØÙØáæØãåâÚåÔà”
Cybersecurity now dominates the priorities of every enterprise striving to adapt to a post-COVID
world. Forced to go remote, their workers’ identities and devices are the new security perimeter.
In fact, cybersecurity for business is now as critical as internet access itself.
ÇÛØâáßìãåâÚåÔàÕèÜßçÙâåçÛØêâåß×ÞæßÔåÚØæçêâåÞ Ùåâà ÛâàØØëãØåÜàØáç”
Studies and news reports had demonstrated that cyber attackers are quick to attack the new,
unprotected threat surfaces created when millions of employees started working from home.
Providing network security to such an unprecedented, distributed ecosystem in this post-
pandemic world is every Network Defense Team’s acid test.
ÇÛØ¶ØåçÜØ×ÁØçêâåÞ·ØÙØáרåé¥ãåâÚåÔàÛÔæÕØØáèãÚåÔר×Ôá×ßâÔר×êÜçÛÕÔççߨ åØÔ×ì
ammunition to help Blue Teams defend and win the war against network breaches. Individuals
Ôá×ÖâåãâåÔçÜâáæßââÞÜáÚçâæçåØáÚçÛØáçÛØÜåÁØçêâåÞ·ØÙØáæØÆÞÜßßæêÜßßá×¶Á·é¥Ôàèæç ÛÔéØ
for 5 reasons:
ÂáßìÖâàãåØÛØáæÜéØáØçêâåÞ×ØÙØáæØãåâÚåÔàÕèÜßççâÜáÖâåãâåÔçØÖåÜçÜÖÔß
æØÖèåØáØçêâåÞæÞÜßßæ ÃåâçØÖ矷ØçØÖçŸÅØæãâá×Ôá×ÃåØ×ÜÖç
ÀÔãæçâÁ¼¶¸¥¡£¹åÔàØêâåÞ
¶âàØæãÔÖÞØ×êÜçÛçÛØßÔçØæççââßæŸçØÖÛáâßâÚÜØæŸÔá×çØÖÛáÜäèØæ
·ØãßâìæÔÛÔá׿ âáÔããåâÔÖÛçâߨÔåáÜáÚ
·ØæÜÚáØ×êÜçÛÔáØáÛÔáÖØ×ÙâÖèæâáÇÛåØÔçÃåØ×ÜÖçÜâ៵èæÜáØææ¶âáçÜáèÜçì
Ôá×·ÜæÔæçØåÅØÖâéØåì

CERTIFIED NETWORK DEFENDER 03
´á´×ÔãçÜ騯ØÖèåÜçìÆçåÔçØÚìÛÃåâçØÖ矷ØçØÖçŸÅØæãâáןÔá×ÃåØ×ÜÖç
Cybersecurity is a continuous, non-linear process. Therefore, your approach to mitigating
cyber risks cannot be static. This is particularly important when the new “normal” has millions
of employees working from remote locations on fragile, home-based WiFi networks and non-
sanitized personal devices.
According to Gartner, traditional “prevent and detect” approaches are inadequate. Opportunistic
by nature, malicious actors look for the easiest ways to attack the most users and siphon off
the maximum gains. Developing a continuous Adaptive Security Cycle helps organizations stay
ÔÛØÔ×âÙÖìÕØåÖåÜàÜáÔßæÕìÖåØÔçÜáÚÔá×ÜàãåâéÜáÚæØÖèåÜçìæìæçØà桸áçØå¶Á·é¥¡
ÃåâçØÖç
ÅØæãâá×
·ØçØÖç
ÃåØ×ÜÖç
• Defense-In-Depth Security
• Properly Designed, Implemented,
and Enforced Security Policies
• Security Architectures
• ´ããåâãåÜÔçØ¶âáÚèåÔçÜâá
• Right Selection of Security
Controls
• Incident Response
• Forensics Investigation
• Business Continuity (BC)
• Disaster Recovery (DR)
• ÇåÔÙÖÀâáÜçâåÜáÚ
• ¿âÚÀÔáÔÚØàØáç
• ¿âÚÀâáÜçâåÜáÚ
• Anomalies Detection
• Risk and Vulnerability Assessment
• Attack Surface Analysis
• Threat Intelligence

CERTIFIED NETWORK DEFENDER 04
´æ»Ôá׿ ÂáÔæÁØçêâåÞ·ØÙØáæØ¶ÔáºØç
¶åØÔçØ×ÕÔæØ×âáÔçÛâåâèÚÛÝâÕçÔæÞÔáÔßìæÜæ
¶Á·é¥ÜæÕÔæØ×âáçÛØÖìը忨ÖèåÜçìØ×èÖÔçÜâáÙåÔàØêâåÞÔá×êâåÞåâߨçÔæÞÔáÔßìæÜæã娿ØáçØ×
by the National Infocomm Competency Framework (NICF). The program is also mapped to the
Department of Defense (DoD) roles for system/network administrators as well as global work
åâߨæÔá×娿ãâáæÜÕÜßÜçÜØæßÔÜ×âèçÕìçÛØåØéÜæØ×Á¼¶¸¹åÔàØêâåÞ¥¡£
´×ÔãçÜ騯ØÖèåÜçìÆçåÔçØÚì
¶Á·é¥ÜáÖßèרæçÛØ´×ÔãçÜ騯ØÖèåÜçìÆçåÔçØÚìŸçÛØåØÕìÜáÖåØÔæÜáÚçÛØæÖâãØÙåâà
Protect – Detect – Respond to Protect – Detect – Respond – Predict.
¼áÖåØÔæØ×¿ÔÕÇÜàØÔá×»Ôá׿ Âá¹âÖèæ
ÀâåØçÛÔᨣ˜âÙçÛØ¶Á·é¥ãåâÚåÔàܿר×ÜÖÔçØ×çâãåÔÖçÜÖÔßæÞÜßßæÜáßÜéØåÔáÚØæ
éÜÔ¸¶ ¶âèáÖÜßßÔÕæÖâéØåÜáÚ×âàÔÜáæßÜÞØÁØçêâåÞ·ØÙØáæØÀÔáÔÚØàØáçŸÁØçêâåÞ
Perimeter Protection, Endpoint Protection, Application and Data Protection,
Enterprise Virtual, Cloud, and Wireless Network Protection, Incident Detection and
Response, and Threat Prediction.
´·Ø×ÜÖÔçØ×Àâ×èߨâá¼âÇÆØÖèåÜçì
IoT security, previously ignored, is now an issue of great concern. IoT devices are
not primarily designed with security in mind. This leaves serious vulnerabilities
êÛÜߨÖâáÚèåÜáÚ¼âÇרéÜÖØæÜáÔáØçêâåÞ¡¶Á·é¥Üáçåâ×èÖØæÖÔá×Ü×ÔçØæçâçÛØ
various challenges that IoT devices pose and the measures required to mitigate
them.
ÁØçêâåÞÉÜåçèÔßÜíÔçÜâáÃåÔÖçÜÖØæÙâåçÛØÅØàâçØÊâåÞÙâåÖØ
ÇåÔÖÞÜáÚæØÖèåÜçìÔããßÜÖÔçÜâáæÔá×ÖâáÚèåÔçÜâáæâÙåØàâçØêâåÞØáéÜåâáàØáçæ
ÔæêâåÞÙâåÖØæãÔáÔÖåâæææØåéØåæÜæéØåì×ÜÙÖèßç¡ÇÛØ¶Á·é¥ãåâÚåÔàçØÔÖÛØæ
candidates to implement and manage the security of virtualization technologies
ÁØçêâåÞ ÉÜåçèÔßÜíÔçÜâá ›ÁÉœŸ ÆâÙçêÔ娠·ØáØ× ÁØçêâåÞ ›Æ·ÁœŸ ÁØçêâåÞ ¹èáÖçÜâá
Virtualization (NFV), OS Virtualization, Containers, Dockers, Kubernetes used in
modern-day networks.

CERTIFIED NETWORK DEFENDER 05
´áÈãÚåÔרâáÀâÕÜßØÆØÖèåÜçìÀØÔæè娿
ÅØæØÔåÖÛ åà ºÔåçáØå ãåØ×ÜÖçæ çÛÔç Õì ¥£¥¤Ÿ ¥ª˜ âÙ ÖâåãâåÔçØ ×ÔçÔ çåÔÙÖ êÜßß
ÕìãÔææãØåÜàØçØåæØÖèåÜçìÔá×âê×ÜåØÖçßìÙåâààâÕÜߨÔá×ãâåçÔÕߨרéÜÖØæçâ
çÛØÖßâèסÊÜçÛçÛØ¶Á·é¥ŸìâèêÜßßߨÔåá¸áçØåãåÜæØÀâÕÜߨ·ØéÜÖØÆØÖèåÜçìŸÅØ×ØáØ
Access Control Security, and other platforms to ensure that this endpoint remains
secure.
¸áÛÔá֨׹âÖèæâá¶ßâèׯØÖèåÜçì
While the adoption of cloud computing in organizations has increased, so have
the challenges. Candidates will learn different ways to ensure security across
éÔåÜâèæÖßâè×ãßÔçÙâåàæ ´ÊÆŸÀÜÖåâæâÙç´íè娶ßâèןÔá׺ââÚߨ¶ßâè×ÃßÔçÙâåà¡
´á¼áçåâ×èÖçÜâáçâÇÛåØÔç¼áçØßßÜÚØáÖØ
Having a proactive approach to security is the new requirement of all organizations.
ÊÜçÛâèç çÛåØÔç ÜáçØßßÜÚØáÖØŸ ìâèå Öìը忨ÖèåÜçì ãâæçèåØ Üæ âáßì åØÔÖçÜ騡 ¶Á· é¥
helps you take a more effective, proactive approach using threat intelligence.
¼áö·ØãçÛ´ççÔÖÞÆèåÙÔÖØ´áÔßìæÜæ
ÇÛØÞØìçâÖìÕØååÜæÞàÔáÔÚØàØáçÜæÜá ×ØãçÛÔççÔÖÞæèåÙÔÖØÔáÔßìæÜæ¡¶Á·é¥çåÔÜáæ
you to identify what parts of your organization need to be reviewed and tested for
security vulnerabilities, and how to reduce, prevent, and mitigate network risks.
¼áÖßèרæçÛØ¿ÔçØæçÇØÖÛáâßâÚì
¶Á·é¥ÖâéØåæçÛØßÔçØæççØÖÛáâßâÚÜØææèÖÛÔæÆâÙçêÔ娷ØáØ×ÁØçêâåޛƷÁœ
security, Network Function Virtualization (NFV) security, container security, docker
security, and Kubernetes security.

CERTIFIED NETWORK DEFENDER 06
´ÕâèççÛØ¸ëÔà
Number of Questions: 100
Test Delivery: ¸¶¶¸Ë´À ¸ëÔàÃåØë­¦¤¥ ¦«›¸¶¶¸Ë´Àœ
Test Duration: §»âèåæ Test Format: ÀèßçÜãߨ¶ÛâÜÖØ
ÃÔææÜáÚæÖâåØ
¼áâåרåçâàÔÜáçÔÜáçÛØÛÜÚÛÜáçØÚåÜçìâÙâèåÖØåçÜÖÔçÜâáØëÔàæŸ¸¶ ¶âèáÖÜ߸ëÔàæÔåØãåâéÜר×Üá
multiple forms (i.e., different question banks). Each form is carefully analyzed through beta testing
with an appropriate sample group under the guidance of a committee of subject matter experts.
ÇÛÜæÔããåâÔÖÛØáæè娿âèåØëÔàæâÙÙØåÔÖÔרàÜÖ×ÜÙÖèßçìŸÔæêØßßÔæàåØÔßêâåß×áÔããßÜÖÔçÜâáæ¡
ÊØÔßæâÛÔéØÔãåâÖØææçâרçØåàÜáØçÛØ×ÜÙÖèßçìåÔçÜáÚâÙØÔÖÛäèØæçÜâá¡ÇÛØÜá×ÜéÜ×èÔßåÔçÜáÚ
then contributes to an overall “Cut Score” for each exam form. To ensure each form adheres to
assessment standards, Cut Scores are set on a “per exam form” basis. Depending on which exam
ÙâåàÜæÖÛÔßߨáÚØ×Ÿ¶èçÆÖâ娿ÖÔáåÔáÚØÙåâà©£˜ç⫨˜

CERTIFIED NETWORK DEFENDER 07
¶âè忨ÂèçßÜáØ
Àâ×èߨ£¤
Àâ×èߨ£¥
Àâ×èߨ£¦
Àâ×èߨ£§
Àâ×èߨ£¨
Àâ×èߨ£©
Àâ×èߨ£ª
Àâ×èߨ£«
Àâ×èߨ£¬
Àâ×èߨ¤£
Àâ×èߨ¤¤
Àâ×èߨ¤¥
Àâ×èߨ¤¦
Àâ×èߨ¤§
Àâ×èߨ¤¨
Àâ×èߨ¤©
Àâ×èߨ¤ª
Àâ×èߨ¤«
Àâ×èߨ¤¬
Àâ×èߨ¥£Network Attacks and Defense Strategies
Administrative Network Security
Technical Network Security
Network Perimeter Security
Endpoint Security-Windows Systems
Endpoint Security-Linux Systems
¸á×ãâÜáçÆØÖèåÜçì ÀâÕÜߨ·ØéÜÖØæ
Endpoint Security-IoT Devices
Administrative Application Security
Data Security
Enterprise Virtual Network Security
Enterprise Cloud Network Security
Enterprise Wireless Network Security
ÁØçêâåÞÇåÔÙÖÀâáÜçâåÜáÚÔá×´áÔßìæÜæ
ÁØçêâåÞ¿âÚæÀâáÜçâåÜáÚÔá×´áÔßìæÜæ
Incident Response and Forensic Investigation
Business Continuity and Disaster Recovery
ÅÜæÞ´áçÜÖÜãÔçÜâáêÜçÛÅÜæÞÀÔáÔÚØàØáç
Threat Assessment with Attack Surface Analysis
Threat Prediction with Cyber Threat Intelligence

CERTIFIED NETWORK DEFENDER £«
ÊÛÔçêÜßßìâèߨÔåá²
Understanding network security
management
¿ØÔåáÕÔæÜÖæâÙåæç娿ãâáæØÔá×
forensics
Building threat intelligence capabilities
Establishing and monitoring log
management
Implementing endpoint security
¶âáÚèåÜáÚâãçÜàèàåØêÔßßæâßèçÜâáæ
Understanding and using IDS/IPS
technologies
Establishing Network Authentication,
Authorization, Accounting (AAA)
Understanding indicators of
Compromise, Attack, and Exposures
(IoC, IoA, IoE)
Establishing network security policies
and procedures
Windows and Linux security
administration
Embedding virtualization technology
security
Determining cloud and wireless security
Deploying and using risk assessment
tools
Setting up mobile and IoT device
security
Implementing data security techniques
on networks

CERTIFIED NETWORK DEFENDER £¬
ÊÛâÜæÜçÙâå²
¶Á· é¥ Üæ Ùâå çÛâæØ êÛâ êâåÞ Üá çÛØ áØçêâåÞ Ô×àÜáÜæçåÔçÜâá¢Öìը忨ÖèåÜçì ×âàÔÜá Üá çÛØ
capacity of Network Administrator/Engineer, Network Security Administrator/Engineer/Analyst,
¶ìը忨ÖèåÜçì¸áÚÜáØØåŸÆØÖèåÜçì´áÔßìæçŸÁØçêâåÞ·ØÙØáæØÇØÖÛáÜÖÜÔáŸÆØÖèåÜçìÂãØåÔçâå¡¶Á·é¥
is for all cybersecurity operations, roles, and anyone looking to build a career in cybersecurity.
ÆèÚÚØæçØ×·èåÔçÜâá­¨·Ôìæ›¬­££´ÀÛ¨­££ÃÀœ
¸ßÜÚÜÕÜßÜçì¶åÜçØåÜÔ
ÇâÕØØßÜÚÜÕߨçâÖÛÔßߨáÚØçÛØ¸¶ ¶âèáÖÜß¶Á·ÖØåçÜÖÔçÜâáØëÔàÜáÔçÜâáŸçÛØÖÔá×Ü×ÔçØÛÔæçêâ
options:
´ççØá×ÂÙÖÜÔßÁØçêâåÞÆØÖèåÜçìÇåÔÜáÜáÚÕ츶 ¶âèáÖÜß­
¼ÙÔÖÔá×Ü×ÔçØÛÔæÖâàãߨçØ×ÔáâÙÖÜÔ߸¶ ¶âèáÖÜßçåÔÜáÜáÚØÜçÛØåÔçÔá´ÖÖåØ×ÜçØ×ÇåÔÜáÜáÚ
Center, via the iClass platform, or at an approved academic institution, the candidate is eligible
to challenge the relevant EC-Council exam without going through the application process.
´ççØàãççÛØ¸ëÔàêÜçÛâèçÂÙÖÜÔ߸¶ ¶âèáÖÜßÇåÔÜáÜáÚ­
¼áâåרåçâÕØÖâáæÜרåØ×ÙâåçÛØ¸¶ ¶âèáÖÜß¶Á·é¥ØëÔàêÜçÛâèçÔççØá×ÜáÚâÙÖÜÔßáØçêâåÞ
æØÖèåÜçìçåÔÜáÜáÚŸçÛØÖÔá×Ü×ÔçØàèæçÛÔéØÔçßØÔæç¥ìØÔåæâÙêâåÞØëãØåÜØáÖØÜáçÛØ¼áÙâåàÔçÜâá
Security domain. If the candidate has the required work experience, they can submit an eligibility
ÔããßÜÖÔçÜâáÙâåàÔßâáÚêÜçÛÈÆ·¤££¡££ŸÔáâá åØÙèá×ÔÕßØÙØØ¡

CERTIFIED NETWORK DEFENDER 10
ÇåÔÜáÜáÚâãçÜâáæ
Ü¿ØÔåá›ÆØßÙ Æçè×ìœ
This solution is a self-directed study environment to deliver
¸¶ ¶âèáÖÜßÞæ¶Á·é¥ãåâÚåÔàÜáÔæçåØÔàÜáÚéÜרâÙâåàÔç¡
ÜÊØØÞ›¿ÜéØÂáßÜáØœ
ÇÛÜæ æâßèçÜâá ãåâéÜרæ ßÜéØŸ âáßÜáØŸ ÜáæçåèÖçâå ßØ× ¶Á· é¥
training. You can attend it from anywhere as long as you have
an internet connection.
ÀÔæçØåÖßÔææ
ÇÛÜæ æâßèçÜâá âÙÙØåæ ìâè çÛØ âããâåçèáÜçì çâ ߨÔåá ¶ØåçÜØ×
Network Defender from the world-class instructors in
collaboration with top information security professionals.
ÇåÔÜáÜáÚÃÔåçáØå›¼áæçåèÖçâå ßØ×ÇåÔÜáÜáÚœ
¶Á·é¥ÜæÔéÔÜßÔÕߨÚßâÕÔßßìçÛåâèÚÛ¸¶ ¶âèáÖÜßÞæ´èçÛâåÜíØ×
Training Partners and are conveniently located in your area
Ôá× âÙÙØåæ ìâè çÛØ ÕØáØç âÙ ßØÔåáÜáÚ çÛåâèÚÛ ØëãØåÜØáÖØ×
ÖØåçܨ׏¶ ¶âèáÖÜßÜáæçåèÖçâåæÔßâáÚêÜçÛìâèåãØØåæŸÚÔÜáÜáÚ
the real-world skills together.
¸×èÖÔçÜâáÃÔåçáØå›¼á ÃØåæâáâåÂáßÜáØœ
ÇÛÜæ æâßèçÜâá âÙÙØåæ ¶Á· é¥ çÛåâèÚÛ ¸¶ ¶âèáÖÜß ´ÖÔרàÜÔ
Partner institutions and is for students enrolled in the applicable
college or university degree programs.

CERTIFIED NETWORK DEFENDER 11
´ÖÖåØ×ÜçÔçÜâáæŸÅØÖâÚáÜçÜâáæŸÔá׸á×â忨àØáçæ
American National Standards
Institute (ANSI)
Government
Communications
Headquarters (GCHQ)
United States Department
of Defense (DoD)
National Infocomm
Competency Framework
(NICF)

CERTIFIED NETWORK DEFENDER 12
ÇØæçÜàâáÜÔßæ
EC-Council offers thorough programs with elaborate training content. My learning
ÙåâàçÛØ¶ØåçÜØ×ÁØçêâåÞ·ØÙØáר囶ïÁ·œãåâÚåÔàÛØßãØ×àØÜáàìãåâÙØææÜâáÔß
ßÜÙØ¡ÊÜçÛçÛÜæâÕçÔÜáØ×Þáâêߨ×ÚØŸ¼êÔæÔÕߨçâÔáÔßìíØçÛØéèßáØåÔÕÜßÜçÜØæÜáâèå
âåÚÔáÜíÔçÜâáÞæ áØçêâåÞ æØÖèåÜçì¡ ¼ Ôßæâ ÖâáçåÜÕèçØ× àì Üáãèçæ çâ æçåØáÚçÛØá çÛØ
ØëÜæçÜáÚæØÖèåÜçìÜáÙåÔæçåèÖçèåØÔçàìêâåÞãßÔÖØ¡
- Raymond Philip Gamboa
´ææÜæçÔáçÀÔáÔÚØå ÆØåéÜÖØÂãØåÔçÜâáæŸ
·ÔÜàߨåÀâÕÜßÜçì´ºŸÆÜáÚÔãâåØ
¹âå àØŸ ¸¶ ¶âèáÖÜßÞæ ¶ØåçÜØ× ÁØçêâåÞ ·ØÙØá×Øå ›¶ïÁ·œ ãåâÚåÔà ÖâéØåØ× çÛØ
êÛâߨ áØçêâåÞ æØÖèåÜçì ×âàÔÜá¡ ¼ç Üæ Ô éØá×âå áØèçåÔߟ ÖâàãåØÛØáæÜéØ ãåâÚåÔà
ÙâÖèæÜáÚáØçêâåÞãåâçâÖâßæŸÖâáçåâßæŸéèßáØåÔÕÜßÜçÜØæŸ×ØéÜÖØæŸÔá×àèÖÛàâ娡ÇÛØ
ãåâÚåÔàÜáÖßèרæÛÔá׿ âáßÔÕæçââÙÙØåÔÕØççØåèáרåæçÔá×ÜáÚâÙÔßßçÛØàÔÝâå
áØçêâåÞæØÖèåÜçìçââßæÔá×çØÖÛáÜäèØæ¡
- George L. S.
¸á×ãâÜáçÃåâçØÖçÜâᢴ¶´Æ´×àÜáÜæçåÔçâåŸ
½ÔÖâÕæŸÈÆ´
¹âåÔßßçÛâæØŸêÛâÔåØãÔææÜâáÔçØçâߨÔåááØçêâåÞæØÖèåÜçìŸìâèååæçæçâãæÛâèß×ÕØ
¸¶ ¶âèáÖÜß ¶ØåçÜØ× ÁØçêâåÞ ·ØÙØá×Øå ›¶ïÁ·œ¡ ÇÛØ ¶ïÁ· Öâè忨êÔåØ ÛØßãØ× àØ
èáרåæçÔá×çÛØ×ÜÙÙØåØáçàâ×èߨæÜáçÛØãåâÚåÔà¡ÃßèæŸçÛØåØÜæáââçÛØåçåÔÜáÜáÚ
ãåâÚåÔàçÛÔçÖÔáÖâéØåçÛÜæ×âàÔÜáêÜçÛæèÖÛÜáÙâåàÔçÜâ᡼êâèß×áÞçÛÔéØÕØØá
ÔÕߨçâÔççÔÜáçÛØ¶ïÁ·ÖåØ×ØáçÜÔßêÜçÛâèçÚâÜáÚçÛåâèÚÛçÛÜæÔ×éÔáÖØ×çåÔÜáÜáÚ¡Àì
ØëãØåÜØáÖØÜáéâß騿ÛÜÚÛ äèÔßÜçìßÔÕæŸÕåÜßßÜÔáçÖâáçØáçרßÜéØåìÕìÔáØëãØåÜØáÖØ×
ÜáæçåèÖçâåŸ Ôá× ØáÖìÖßâãØ×ÜÖ Þáâêߨ×ÚØ âÙ çÛØ ×âàÔÜá¡ ¼ç Ôßæâ ÖâéØåØ× éÔåÜâèæ
ÜàãâåçÔáç áØçêâåÞÜáÚ çâãÜÖæ êÛÜÖÛ àÔר çÛÜæ ØáçÜåØ ßØÔåáÜáÚ ØëãØåÜØáÖØ éØåì
åØßÔçÔÕߨçâåØÔß êâåß׿֨áÔåÜâæ¡´ÙçØåçÛÜæŸ¼ÔàãßÔááÜáÚâáãåâÚ娿æÜáÚÙèåçÛØå
çÛåâèÚÛçÛØãÔçÛâÙÖåØ×ØáçÜÔßæ¡
- Geoffrey Chisnall
ÁØçêâåÞÆØÖèåÜçì´×àÜáÜæçåÔçâåŸ
¸ëãØåÜÔáŸÆâèçÛ´ÙåÜÖÔ

CERTIFIED NETWORK DEFENDER 13
ÀìØëãØåÜØáÖØêÜçÛ¸¶ ¶âèáÖÜßÕØÚÜááÜáÚÙåâàçÛØåæççåÔÜáÜáÚÜᥣ¤¨ŸèáçÜßáâê
ÛÔæÕØØáÔáØëÖØßߨáçâããâåçèáÜçì¡ÇÛØÖâè忨êÔåØÔá×çÛØçåÔÜáÜáÚàÔçØåÜÔߟêÛØá
ÖâàãÔåØ×çââçÛØåéØá×âåçåÔÜáÜáÚÖâè忨æŸÔåØàèÖÛÕØççØåŸÜàãåâéÜáÚâéØåçÛØ
ìØÔåæêÜçÛØéØåìáØêéØåæÜâáèã×ÔçØÔá×ÖåØ×ØáçÜÔßåØßØÔæØ¡
- Ivica Gjorgjevski
»ØÔ×âÙ·ØãÔåçàØáçÙâ寨ÖèåÜçì´ÖÖåØ×ÜçÔçÜâáâÙ¶ßÔææÜØ×ÜáÙâåàÔçÜâáÔá×¼¶ÇæèããâåçŸ
·ÜåØÖçâåÔçØÙâ寨ÖèåÜçìâÙ¶ßÔææÜØ×¼áÙâåàÔçÜâáŸÁâåçÛÀÔÖØ×âáÜÔ
´ÙçØå áÜæÛÜáÚ àì ÖâáçåÔÖç êÜçÛ çÛØ ´åàìŸ ÁØê »âåÜíâáæ ¶âàãèçØå ¿ØÔåáÜáÚ
¶ØáçØåæ âÙÙØåØ× àØ ÖÔ娨å çåÔÜáÜáÚ Üá ¶ìը忨ÖèåÜçì¡ ¼ êÔáçØ× çâ çÔÞØ èã ¸¶ 
¶âèáÖÜßÝæ ¶ØåçÜØ× ÁØçêâåÞ ·ØÙØá×Øå ›¶ïÁ·œ ÕØÖÔèæØ âÙ Üçæ àÔææÜéØ Ôàâèáç âÙ
çåÔÜáÜáÚàÔçØåÜÔß¡¼êÔæçÛåÜßߨ×çâÕØÔÕߨçâߨÔåáÔá×çØæçàìÔÕÜßÜçÜØæÜá×ÜÙÙØåØáç
áØçêâåÞæØÖèåÜçìÖâáÖØãçæ¡¼Ùâèá×ÜçææâèåÖØàÔçØåÜÔßêØßßêåÜççØáÔá×ÙèßßâÙáØê
ÜáÙâåàÔçÜâá¡ ÇÛØ ¶ïÁ· çåÔÜáÜáÚ åØàÜá×Ø× àØ ÔßêÔìæ çâ æçÔì éÜÚÜßÔáç¡ ÁØéØå æçâã
ߨÔåáÜáÚÕØÖÔèæØçÛØåØÞæÔßêÔìææâàØçÛÜáÚáØêâèççÛØåØçâ×ÜæÖâéØå¡
Kenneth P.
Researcher
¼¸¸¸ŸÆãÔÜá

EC-Council
www.eccouncil.org