Temika

Certified Network Defender (CND)

Program resmi dari EC-Council yang dirancang untuk membekali profesional IT dengan keterampilan menjaga, mendeteksi, dan merespons ancaman jaringan. Training ini menyiapkan Anda menghadapi tantangan keamanan jaringan modern dengan pendekatan defensif, proaktif, dan berstandar global.

Ikuti Training Certified Network Defender (CND)​

Di era serangan siber yang semakin kompleks, perusahaan membutuhkan defender handal untuk melindungi aset digitalnya. Certified Network Defender (CND) menghadirkan kurikulum komprehensif yang mencakup arsitektur keamanan jaringan, deteksi intrusi, analisis log, hardening sistem, hingga strategi incident response. Melalui kombinasi teori + hands-on lab, peserta akan memahami cara kerja hacker, sekaligus menguasai teknik pertahanan efektif untuk menjaga infrastruktur jaringan perusahaan.

Simak Keuntungan Ikut Pelatihan di Temika Cyber

Hands-on Network Defense Lab

Praktikum langsung: konfigurasi firewall, IDS/IPS, VPN, dan SIEM.

Materi Resmi EC-Council

Kurikulum sesuai standar CND, mencakup serangan modern & defense tools.

Incident Detection & Response

Teknik investigasi log, analisis trafik, hingga prosedur mitigasi.

Exam Preparation & Certification Path

Latihan soal, strategi ujian, hingga tips menghadapi sertifikasi CND resmi.

Career-Ready Skills & Networking

Skill praktis: hardening jaringan, keamanan cloud, network forensics, threat intelligence dasar.

Real-World Tools & Frameworks

Gunakan tools populer: Wireshark, Snort, Suricata, Splunk, dan open-source framework lainnya.

Kenapa Harus Menguasai CND?

Continuous Monitoring and Incident Response

πŸš€ Permintaan Profesional Tinggi

Network security engineer dan defender sangat dibutuhkan di berbagai industri.

Data Analysis & Collection

πŸ’° Prospek Karier & Gaji Kompetitif

Profesi network defender dikenal dengan rata-rata gaji yang menjanjikan.

Initiate incident response protocols

⚑ Ancaman Nyata

Hacker memanfaatkan kelemahan jaringan, CND membekali skill untuk menutup celah.

Jadwal Pelatihan

Pelatihan dimulai

Program Akan dilaksanakan secara: –
Periode Kelas: –
Estimasi Durasi Belajar: –

Tujuan Pelatihan

Setelah menyelesaikan kursus ini dengan sukses, peserta akan mampu:

  • Memahami konsep dasar keamanan jaringan dan defense-in-depth.
  • Menguasai teknik monitoring, logging, dan analisis trafik.
  • Mengetahui cara kerja IDS/IPS, firewall, dan VPN.
  • Menerapkan hardening pada sistem dan perangkat jaringan.
  • Melakukan incident response dan forensic dasar.
  • Mengintegrasikan threat intelligence dalam strategi pertahanan.
  • Menyiapkan peserta untuk ujian resmi Certified Network Defender (CND).

Silabus

  • 09:00 – 09:30: Welcome & Course Introduction
    • Introductions and expectations.
    • Overview of CND certification and exam process.
  • 09:30 – 10:45: Module 01 – Network Fundamentals & Defense-in-Depth
    • Basics of networking and protocols.
    • Defense-in-depth strategy for enterprise security.
  • 10:45 – 11:00: Morning Break
  • 11:00 – 12:30: Module 02 – Network Security Threat Landscape
    • Types of attacks: malware, phishing, DoS, MITM, insider threats.
    • Understanding threat actors and motives.
  • 12:30 – 13:30: Lunch Break
  • 13:30 – 15:00: Module 03 – Network Defense Essentials
    • Network security architecture.
    • Hands-on Lab: Configuring basic security on network devices.
  • 15:00 – 15:15: Afternoon Break
  • 15:15 – 16:45: Module 04 – Administrative Network Security
    • Policy creation and user access control.
    • Hands-on Lab: Implementing network security policies.
  • 16:45 – 17:00: Day 1 Wrap-up & Q&A
  • 09:00 – 10:30: Module 05 – Perimeter Security Fundamentals
    • Firewalls, IDS/IPS, and network segmentation.
    • Hands-on Lab: Firewall configuration basics.
  • 10:30 – 10:45: Morning Break
  • 10:45 – 12:15: Module 06 – Intrusion Detection & Prevention
    • Snort, Suricata, and IDS/IPS methodologies.
    • Hands-on Lab: Deploying IDS for packet analysis.
  • 12:15 – 13:15: Lunch Break
  • 13:15 – 15:00: Module 07 – VPN & Secure Remote Access
    • Virtual Private Networks, tunneling, and encryption protocols.
    • Hands-on Lab: VPN setup for secure communication.
  • 15:00 – 15:15: Afternoon Break
  • 15:15 – 16:45: Module 08 – Case Study: Perimeter Breach Defense
    • Scenario-based exercise on defending network perimeter.
  • 16:45 – 17:00: Day 2 Wrap-up & Q&A
  • 09:00 – 10:30: Module 09 – Network Monitoring & Traffic Analysis
    • Packet capture, flow analysis, and anomaly detection.
    • Hands-on Lab: Wireshark traffic monitoring.
  • 10:30 – 10:45: Morning Break
  • 10:45 – 12:15: Module 10 – Log Management & SIEM
    • Centralized logging, ELK stack, and Splunk fundamentals.
    • Hands-on Lab: Setting up log collection and SIEM alerts.
  • 12:15 – 13:15: Lunch Break
  • 13:15 – 15:00: Module 11 – Endpoint Security & Hardening
    • Hardening operating systems and applications.
    • Hands-on Lab: Applying security baselines to endpoints.
  • 15:00 – 15:15: Afternoon Break
  • 15:15 – 16:45: Module 12 – Case Study: Incident Monitoring
    • Simulated SOC environment for monitoring suspicious activity.
  • 16:45 – 17:00: Day 3 Wrap-up & Q&A
  • 09:00 – 10:30: Module 13 – Network Hardening & Patch Management
    • Securing routers, switches, and servers.
    • Hands-on Lab: Applying patches and security configs.
  • 10:30 – 10:45: Morning Break
  • 10:45 – 12:15: Module 14 – Wireless Network Security
    • WPA3, rogue AP detection, and wireless monitoring.
    • Hands-on Lab: Securing Wi-Fi networks.
  • 12:15 – 13:15: Lunch Break
  • 13:15 – 15:00: Module 15 – Cloud & Virtualization Security
    • Securing cloud workloads and virtualized environments.
    • Hands-on Lab: Cloud instance security configuration.
  • 15:00 – 15:15: Afternoon Break
  • 15:15 – 16:45: Module 16 – Case Study: Hybrid Environment Defense
    • Defending a mixed on-premises and cloud environment.
  • 16:45 – 17:00: Day 4 Wrap-up & Q&A
  • 09:00 – 10:30: Module 17 – Incident Response Planning
    • IR lifecycle: Preparation, Detection, Containment, Eradication, Recovery.
    • Hands-on Lab: Simulated incident response exercise.
  • 10:30 – 10:45: Morning Break
  • 10:45 – 12:15: Module 18 – Network Forensics Basics
    • Collecting and analyzing network-based evidence.
    • Hands-on Lab: Network forensic case analysis.
  • 12:15 – 13:15: Lunch Break
  • 13:15 – 15:00: Module 19 – Exam Tips & Practice Questions
    • Discussion of exam format, practice questions, and strategies.
  • 15:00 – 15:15: Afternoon Break
  • 15:15 – 16:45: Module 20 – Mock Assessment & Q&A
    • Scenario-based mock exam simulation.
  • 16:45 – 17:00: Course Wrap-up & Certification Guidance

Meet Your Expert

Trainer 1

Ethical Hacker

Trainer 2

Ethical Hacker

Galeri Pelatihan

Apa Kata Mereka Tentang Pelatihan Ini

Sertifikasi Profesional Kami

Dapatkan Harga Spesial Selama Promo

Early Bird I

Rp17jt Rp15jt/Peserta
  • Intensive Training (5 Days)
  • Official EC-Council Exam Voucher
  • Official Training Material (e-Courseware)
  • Official iLabs Access
  • Certificate of Attendance

FAQ

CND adalah program resmi EC-Council yang fokus pada pertahanan jaringan, monitoring, dan incident handling.
Network administrator, SOC analyst, IT security officer, dan siapa pun yang ingin memperkuat keahlian di network defense.
Ya, peserta akan belajar menggunakan tools nyata seperti Wireshark, Snort, dan Splunk.
Ya, sertifikasi ini diakui secara internasional oleh industri keamanan siber.
Training dilaksanakan selama 5 hari intensif dengan kombinasi teori dan hands-on lab.
Dasar networking dan security akan sangat membantu, namun fresh graduate juga bisa ikut.
Ya, peserta mendapat soal latihan, tips, dan simulasi ujian resmi CND.

Mereka Telah Mempercayakannya Kepada Kami