EC-Council Certified Network Defender (CND) - Only 4 Days

Seven reasons why you should sit your CND course with Firebrand Training

Find Out How We Help You To Learn New Skills Quickly

  1. You'll be CND certified in just 4 days. With us, you’ll be CND trained in record time
  2. Our CND course is all-inclusive. A one-off fee covers all course materials, exams, accommodation and meals. No hidden extras
  3. Pass CND first time or train again for free. This is our guarantee. We’re confident you’ll pass your course first time. But if not, come back within a year and only pay for accommodation, exams and incidental costs
  4. You’ll learn more CND. A day with a traditional training provider generally runs from 9am – 5pm, with a nice long break for lunch. With Firebrand Training you’ll get at least 12 hours/day quality learning time, with your instructor
  5. You’ll learn CND faster. Chances are, you’ll have a different learning style to those around you. We combine visual, auditory and tactile styles to deliver the material in a way that ensures you will learn faster and more easily
  6. You’ll be studying CND with the best. We’ve been named in Training Industry’s “Top 20 IT Training Companies of the Year” every year since 2010. As well as winning many more awards, we’ve trained and certified 62,884 professionals, and we’re partners with all of the big names in the business
  7. You'll do more than study CND courseware. We use practical exercises to make sure you can apply your new knowledge to the work environment. Our instructors use demonstrations and real-world experience to keep the day interesting and engaging

Think you are ready for the course? Take a FREE practice test to assess your knowledge!

When do you want to sit your accelerated course?

Start

Finish

Status

Book now

Finished

 

Open

Book now

Open

Book now

Open

Book now

Here's the Firebrand Training review section. Since 2001 we've trained exactly 62,884 students and asked them all to review our Accelerated Learning. Currently, 96.45% have said Firebrand exceeded their expectations:



"Hard work, long hours, but interesting and fun! Great instructor!"
Mark Elvidge, Uplinkman Ltd. - EC-Council Certified Ethical Hacker (CEH) (5 days) (20/2/2017 to 24/2/2017)

"Wonderfull training.The trainer provided so much technical informations and Lab exercices. The course was really hands-on. "
Gbessi Vincent TOH, T-Inet Consulting. - EC-Council Certified Ethical Hacker (CEH) (5 days) (20/2/2017 to 24/2/2017)

"Bootcamp style, intensive training. Very experienced trainer - extremely knowledgable. Good material, nice location and amenities."
N.H. - EC-Council Certified Ethical Hacker (CEH) (5 days) (20/2/2017 to 24/2/2017)

"The material was appropriate, the delivery excellent. Loved the practices and the exercises. "
I.Y, Go Live UK Ltd. - EC-Council Certified Ethical Hacker (CEH) (5 days) (20/2/2017 to 24/2/2017)

"Amazing stay Very friendly staff Well presented course Always helpful & very informative Would come again :)"
Richard Howard, Microcomms. - EC-Council Certified Ethical Hacker (CEH) (5 days) (12/12/2016 to 16/12/2016)

"The instructor's knowledge and experience was very clear. The demonstrations and labs were very well constructed. The training facility was excellent."
T.W. - EC-Council Certified Ethical Hacker (CEH) (5 days) (28/11/2016 to 2/12/2016)

"I wouldn't get trained anywhere else."
R.B. - EC-Council Computer Hacking Forensics Investigator (CHFI) (5 days) (28/11/2016 to 2/12/2016)

"The tutor has formidable knowledge. The environment was superb. I really enjoyed the course and content "
A.K. - EC-Council Computer Hacking Forensics Investigator (CHFI) (5 days) (28/11/2016 to 2/12/2016)

"Excellent facilities that take care of all small stuff so you can concentrate on the learning."
Iain Bowker, Sopra Steria. - EC-Council Computer Hacking Forensics Investigator (CHFI) (5 days) (28/11/2016 to 2/12/2016)

"Very good course, excellent anecdotal reinforcement from instructor. A good balance of theory and practical exercises. Facilities at Wyboston excellent."
James Metcalfe, 4secure Ltd. - EC-Council Certified Ethical Hacker (CEH) (5 days) (14/11/2016 to 18/11/2016)

"Another great course here at Firebrand, its tough but enjoyable!"
Lee Carter. - EC-Council Certified Ethical Hacker (CEH) (5 days) (14/11/2016 to 18/11/2016)

"A very good course and an excellent trainer. "
N.M. - EC-Council Certified Chief Information Security Officer (CCISO) (3 days) (17/10/2016 to 19/10/2016)

"Excellent course, very experienced trainer "
Anonymous - EC-Council Certified Chief Information Security Officer (CCISO) (3 days) (17/10/2016 to 19/10/2016)

"Very intense, yet enjoyable. The information given on this course is very useful, and also includes extras from the instructor. 24-hour labs support learning all the way through."
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (3/10/2016 to 7/10/2016)

"Its been an intense week of interesting training, the food was great and the instructor was excellent, with a full understanding of the subject matter and the transfer skills to go with it. It is rare to find such a high level of instructor ability coupled with real life experience and knowledge."
A.L.C. - EC-Council Certified Ethical Hacker (CEH) (5 days) (3/10/2016 to 7/10/2016)

"Overall good experience. Staff are helpful. "
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (3/10/2016 to 7/10/2016)

"As always, a great instructor and a great group to train with!"
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (3/10/2016 to 7/10/2016)

"Intense training, but well paced and set out, everything explained and facilities and tutor available 24-7 for your convenience."
Anonymous, Corby Business Academy - EC-Council Certified Ethical Hacker (CEH) (5 days) (3/10/2016 to 7/10/2016)

"Good methods used for intensive training. Hard work but worth doing."
David Pe, Yorkshire Building Society. - EC-Council Computer Hacking Forensics Investigator (CHFI) (5 days) (15/8/2016 to 19/8/2016)

"Good facilities and staff are very knowledgeable."
Rolston Wiltshire, Rolston Wiltshire LTD. - EC-Council Certified Chief Information Security Officer (CCISO) (3 days) (25/7/2016 to 27/7/2016)

"It is an excellent place to be for training due to the experience of teachers and the level and quality of training. Training centre is at a good location with very academic and teaching environment."
Gyanu Raut, QA Client - NHS Kings College Hospital. - EC-Council Certified Chief Information Security Officer (CCISO) (3 days) (25/7/2016 to 27/7/2016)

"At times this was intense, eye opening but always fun. Thank you :-)"
N.Y. - EC-Council Certified Ethical Hacker (CEH) (5 days) (13/6/2016 to 17/6/2016)

"Intensive courses with all the support that you need. Just bring will power!"
David Hull. - EC-Council Certified Ethical Hacker (CEH) (5 days) (13/6/2016 to 17/6/2016)

"Firebrand Training are really on the top of their profession with loads of experience."
T.B. - EC-Council Certified Ethical Hacker (CEH) (5 days) (13/6/2016 to 17/6/2016)

"Firebrand provides a very good environment to fast-track your exam without any worries."
D.S. - EC-Council Computer Hacking Forensics Investigator (CHFI) (5 days) (23/5/2016 to 27/5/2016)

"Training was brilliant, had a brilliant week. Would definitely recommend to family/friends and look forward to coming back to Firebrand."
Sultan Khan, Laing. - EC-Council Certified Ethical Hacker (CEH) (5 days) (9/5/2016 to 13/5/2016)

"It was enjoyable, hard and pressured but really worth it in the end."
Andrew Davis. - EC-Council Certified Ethical Hacker (CEH) (5 days) (9/5/2016 to 13/5/2016)

"Be prepared to work hard, lessons are long and the remaining time will be spent going over the masses of material in private study. But the course material is of excellent quality, instructor first class in subject and it is very high quality training."
Matt Williams, Evolved Intelligence. - EC-Council Certified Ethical Hacker (CEH) (5 days) (18/4/2016 to 22/4/2016)

"I really enjoyed the CEH course. The instructor was very helpful and clear when explaining information. In addition, the venue was great. I would always recommend Firebrand Training to a friend or colleague. "
Shola Abhulimhen, ink global. - EC-Council Certified Ethical Hacker (CEH) (5 days) (25/3/2016 to 29/3/2016)

"Fantastic experience. I'd been on holiday for six months and did this training as a way to kick start my brain back into the work mode and despite being very challenging and long hours it was extremely rewarding. It was in an area I wasn't very familiar with but at the end of the course I can walk away feeling confident and I need about a month to just play with all the new skills I've learnt. The friendliness of the class and the fully immersive learning style blew me away with what I was able to take away. Already planning my next training."
Dave Gibbons, Davinchio Tech LTD. - EC-Council Certified Ethical Hacker (CEH) (5 days) (18/4/2016 to 22/4/2016)

"Good course, but hard work."
T.W. - EC-Council Certified Ethical Hacker (CEH) (5 days) (18/4/2016 to 22/4/2016)

"The training was just excellent and the trainer very experienced and motivated as well, a great balance between theory and hands on exercises! I would be glad to come back to Firebrand again. "
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (18/4/2016 to 22/4/2016)

"The training is intense and the experience informative with all the necessary tools and techniques to give you confidence in the exam, which comes around way too fast, and beyond as you start using the knowledge in real life. I would recommend it to anyone committed enough to go through a short, sharp education."
Philip Bell, Oracle Corporation. - EC-Council Certified Ethical Hacker (CEH) (5 days) (18/4/2016 to 22/4/2016)

"CEH - really great training. Intensive, hard work, lots of hands on, and tons of information. "
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (18/4/2016 to 22/4/2016)

"Great training course."
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (18/4/2016 to 22/4/2016)

"Great training! It was a good refresher of what I already knew, but also an eye-opener on all the new hacking techniques and tools that I didn't know about. Definitely worth the time spent, and it prepares you very well for he certification."
Olivier Thonnard, AMADEUS SAS. - EC-Council Certified Ethical Hacker (CEH) (5 days) (22/2/2016 to 26/2/2016)

"Very dense course, but very good overview."
S.F. - EC-Council Certified Ethical Hacker (CEH) (5 days) (22/2/2016 to 26/2/2016)

"Firebrand training environment doesn't let down. The labs are well resourced and the instructors very knowledgeable. You cant fail."
Arnold Mangeni, National Information Technology Authority. - EC-Council Certified Ethical Hacker (CEH) (5 days) (22/2/2016 to 26/2/2016)

"I was a bit skeptical about the whole organisation and training as well. But quality of accommodation turned out to be excellent, staff very pleasant and ready to help. As for a training, pace is a bit frantic, but dynamic, full of right, tech information. We were participating, ask questions and gave answers when asked, energy was great. That is what I've like the most about the training. I've learned a lot and now have a good base to expand my knowledge."
Tamara Velanac, Telenor. - EC-Council Certified Ethical Hacker (CEH) (5 days) (22/2/2016 to 26/2/2016)

"Excellent training, very detailed content, trainer had superb breadth of knowledge on the content being delivered. I would certainly attend another Firebrand training course, if this experience was representative of the quality and results they produce. Would also recommend highly to colleagues interested in training."
David Scott. - EC-Council Certified Ethical Hacker (CEH) (5 days) (22/2/2016 to 26/2/2016)

"Tutor very knowledgeable on subjects/modules within the course. Nothing was to much trouble for tutor, extra learning, tricky questions all taken care of."
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (22/2/2016 to 26/2/2016)

"It's great to be taught by somebody who is clearly an expert on the subject matter and who actually makes their living doing this stuff."
Tom Chantler, Chantler Solutions Ltd. - EC-Council Certified Ethical Hacker (CEH) (5 days) (22/2/2016 to 26/2/2016)

"Very pratical and interesting course. Great organisation and teacher."
Alain Simon. - EC-Council Certified Ethical Hacker (CEH) (5 days) (22/2/2016 to 26/2/2016)

"An amazing centre where you can really focus on the task at hand. Firebrand is not for the faint-hearted but you can be sure that the course is given yours and their full attention."
Mark Stone. - EC-Council Certified Ethical Hacker (CEH) (5 days) (22/2/2016 to 26/2/2016)

"Excellent training Instructor very knowledgeable."
David Harrogate. - EC-Council Certified Ethical Hacker (CEH) (5 days) (22/2/2016 to 26/2/2016)

"Although the course material was incredibly vast, Fred went through it at a pace that suited the class and was very knowledgeable about the subject. Brilliant instructor, he even showed us where the good coffee machine was!"
J.P. - EC-Council Certified Ethical Hacker (CEH) (5 days) (22/2/2016 to 26/2/2016)

"My third course with Firebrand, hopefully not my last. Knowledgeable and helpful instructors, great training environment!"
Mark Laing. - EC-Council Certified Ethical Hacker (CEH) (5 days) (22/2/2016 to 26/2/2016)

"Our instructor was extremely knowledgeable about the subject area, the facility was a perfect learning environment. I am very happy with the course, and it helps that I achieved my certification as well. Whoever wishes to study the CEH course, I suggest several years of hands on experience at system administration, or development, including linux, as the material is extremely high level and complex. My one criticism is that the desks in the classroom were not large enough, I would suggest that having more personal space to spread out whilst learning would assist in results."
William Sinclair, STS Commercial Ltd. - EC-Council Certified Ethical Hacker (CEH) (5 days) (18/1/2016 to 22/1/2016)

"I had a great week at Firebrand on the ethical hacking course. The instructor was brilliant and gave us real world scenarios for our hands on lessons. Very good fun! And the food was great as Well!!"
Mike Jones, Self Employed. - EC-Council Certified Ethical Hacker (CEH) (5 days) (15/2/2016 to 19/2/2016)

"Very relaxed atmosphere, given plenty of time and quality equipment to learn in. Accommodation is adequate, being a part of the facility helps with convenience and saves travelling times etc. Instructor knowledge and assistance was outstanding. All together a very professional outfit - Well done!"
Martin Trevor, The Co-operative. - EC-Council Certified Ethical Hacker (CEH) (5 days) (14/12/2015 to 18/12/2015)

On this accelerated 4 day Certified Network Defender course you will develop your understanding of network security technologies and operations.

We live in a digital age where cyber crime poses an ever increasing threat to individuals and businesses alike. In order to prevent costly and destructive breaches, you and your organisation must be appropriately skilled and aware of the potential threats. The CND course will teach you the critical skills necessary to protect detect and respond to cyber attacks.

Your EC-Council certified instructor will employ Firebrand’s unique Lecture | Lab | Review technique, making use of theoretical content as well as hands-on tasks on major network security tools and techniques. Made up of 50% practical work this course will provide network administrators with real-world expertise on current network security technologies and operations such as:

  • Network security controls, protocols and devices
  • Security policies for your organisation
  • Choosing appropriate firewall solution, topology and configurations
  • Risk and vulnerability assessment
  • First response to a network security incident

On this course you’ll be prepared to sit the Certified Network Defender (CND) 312-38 exam. You’ll sit this on-site, during the course, covered by your Certification Guarantee.

This course, which is 20% faster than traditional training, is ideal if you're a Network Administrator, Network Security Administrator, Network Security Engineer or you're involved in network operations.

8x Accredited Training Centre of the Year

Accredited Training Centre of the Year

Firebrand Training has again won the EC-Council Accredited Training Centre of the Year Award, from a Training Partner network that has more than 700 training centres across 107 countries. This extends a record-breaking run of successive awards to eight years.

Jay Bavisi, President of EC-Council said: “The annual EC-Council Awards highlights the commitment and achievements of our global partners and trainers that have contributed to the information security community.”

Read more ...

Interested? See prices or call 080 80 800 888

  • Get certified 20% faster: Get trained in just 4 days compared with 5 days on other traditional courses. This means you’ll be back at work sooner, applying your new found skills.
  • EC-Council Official Curriculum: You will have access to official EC-Council curriculum, which means the content will be the most current and up-to-date.
  • EC-Council Certified Instructors: Our EC-Council instructors have years of industry-relevant knowledge, which can be used to provide valuable context to the course material.
  • Lecture | Lab | Review: This Firebrand technique employs a mixture of theoretical and practical work designed to help you retain information and develop the skills to apply your knowledge to real-world scenarios.

Other accelerated training providers rely heavily on lecture and independent self-testing and study.

Effective technical instruction must be highly varied and interactive to keep attention levels high, promote camaraderie and teamwork between the students and instructor, and solidify knowledge through hands-on learning.

Firebrand Training provides instruction to meet every learning need:

  • Intensive group instruction
  • One-on-one instruction attention
  • Hands-on labs
  • Lab partner and group exercises
  • Question and answer drills
  • Independent study

This information has been provided as a helpful tool for candidates considering training. Courses that include certification come with a Certification Guarantee. Pass first time or train again for free (just pay for accommodation, exams and incidental costs). We do not make any guarantees about personal successes or benefits of obtaining certification. Benefits of certification determined through studies do not guarantee any particular personal successes.

Read more ...

Interested? See prices or call 080 80 800 888

In preparing you to become a Certified Network Defender, the CND course will cover the following domains in Cyber defence:

Module 01: Computer Network Defense Fundamentals

  • Network Fundamentals
  • Network Components
  • TCP/IP Networking Basics
  • TCP/IP Protocol Stack
  • IP Addressing
  • Computer Network Defense (CND)
  • CND Triad
  • CND Process
  • CND Actions
  • CND Approaches

Module 02: Network Security Threats, Vulnerabilities, and Attacks

  • Essential Terminologies
  • Network Security Concerns
  • Network Security Vulnerabilities
  • Network Reconnaissance Attacks
  • Network Access Attacks
  • Denial of Service (DoS) Attacks
  • Distributed Denial-of-Service Attack (DDoS)
  • Malware Attacks

Module 03: Network Security Controls, Protocols, and Devices

  • Fundamental Elements of Network Security
  • Network Security Controls
  • User Identification, Authentication, Authorisation and Accounting
  • Types of Authorisation Systems
  • Authorisation Principles
  • Cryptography
  • Security Policy
  • Network Security Devices
  • Network Security Protocols

Module 04: Network Security Policy Design and Implementation

  • What is Security Policy?
  • Internet Access Policies
  • Acceptable-Use Policy
  • User-Account Policy
  • Remote-Access Policy
  • Information-Protection Policy
  • Firewall-Management Policy
  • Special-Access Policy
  • Network-Connection Policy
  • Business-Partner Policy
  • Email Security Policy
  • Passwords Policy
  • Physical Security Policy
  • Information System Security Policy
  • Bring Your Own Devices (BYOD) Policy
  • Software/Application Security Policy
  • Data Backup Policy
  • Confidential Data Policy
  • Data Classification Policy
  • Internet Usage Policies
  • Server Policy
  • Wireless Network Policy
  • Incidence Response Plan (IRP)
  • User Access Control Policy
  • Switch Security Policy
  • Intrusion Detection and Prevention (IDS/IPS) Policy
  • Personal Device Usage Policy
  • Encryption Policy
  • Router Policy
  • Security Policy Training and Awareness
  • ISO Information Security Standards
  • Payment Card Industry Data Security Standard (PCI-DSS)
  • Health Insurance Portability and Accountability Act (HIPAA)
  • Information Security Acts: Sarbanes Oxley Act (SOX)
  • Information Security Acts: Gramm-Leach-Bliley Act (GLBA)
  • Information Security Acts: The Digital Millennium Copyright Act (DMCA) and Federal Information Security Management Act (FISMA)
  • Other Information Security Acts and Laws

Module 05: Physical Security

  • Physical Security
  • Access Control Authentication Techniques
  • Physical Security Controls
  • Other Physical Security Measures
  • Workplace Security
  • Personnel Security: Managing Staff Hiring and Leaving Process
  • Laptop Security Tool: EXO5
  • Environmental Controls
  • Physical Security: Awareness /Training
  • Physical Security Checklists

Module 06: Host Security

  • Host Security
  • OS Security
  • Linux Security
  • Securing Network Servers
  • Hardening Routers and Switches
  • Application/software Security
  • Data Security
  • Virtualisation Security

Module 07: Secure Firewall Configuration and Management

  • Firewalls and Concerns
  • What Firewalls Does?
  • What should you not Ignore?: Firewall Limitations
  • How Does a Firewall Work?
  • Firewall Rules
  • Types of Firewalls
  • Firewall Technologies
  • Firewall Topologies
  • Firewall Rule Set & Policies
  • Firewall Implementation
  • Firewall Administration
  • Firewall Logging and Auditing
  • Firewall Anti-evasion Techniques
  • Why Firewalls are Bypassed?
  • Full Data Traffic Normalisation
  • Data Stream-based Inspection
  • Vulnerability-based Detection and Blocking
  • Firewall Security Recommendations and Best Practices
  • Firewall Security Auditing Tools

Module 08: Secure IDS Configuration and Management

  • Intrusions and IDPS
  • IDS
  • Types of IDS Implementation
  • IDS Deployment Strategies
  • Types of IDS Alerts
  • IPS
  • IDPS Product Selection Considerations
  • IDS Counterparts

Module 09: Secure VPN Configuration and Management

  • Understanding Virtual Private Network (VPN)
  • How VPN works?
  • Why to Establish VPN ?
  • VPN Components
  • VPN Concentrators
  • Types of VPN
  • VPN Categories
  • Selecting Appropriate VPN
  • VPN Core Functions
  • VPN Technologies
  • VPN Topologies
  • Common VPN Flaws
  • VPN Security
  • Quality Of Service and Performance in VPNs

Module 10: Wireless Network Defense

  • Wireless Terminologies
  • Wireless Networks
  • Wireless Standard
  • Wireless Topologies
  • Typical Use of Wireless Networks
  • Components of Wireless Network
  • WEP (Wired Equivalent Privacy) Encryption
  • WPA (Wi-Fi Protected Access) Encryption
  • WPA2 Encryption
  • WEP vs. WPA vs. WPA2
  • Wi-Fi Authentication Method
  • Wi-Fi Authentication Process Using a Centralised Authentication Server
  • Wireless Network Threats
  • Bluetooth Threats
  • Wireless Network Security
  • Wi-Fi Discovery Tools
  • Locating Rogue Access points
  • Protecting from Denial-of-Service Attacks: Interference
  • Assessing Wireless Network Security
  • Wi-Fi Security Auditing Tool: AirMagnet WiFi Analyser
  • WPA Security Assessment Tool
  • Wi-Fi Vulnerability Scanning Tools
  • Deploying Wireless IDS (WIDS) and Wireless IPS (WIPS)
  • WIPS Tool
  • Configuring Security on Wireless Routers
  • Additional Wireless Network Security Guidelines

Module 11: Network Traffic Monitoring and Analysis

  • Network Traffic Monitoring and Analysis(Introduction)
  • Network Monitoring: Positioning your Machine at Appropriate Location
  • Network Traffic Signatures
  • Packet Sniffer: Wireshark
  • Detecting OS Fingerprinting Attempts
  • Detecting PING Sweep Attempt
  • Detecting ARP Sweep/ ARP Scan Attempt
  • Detecting TCP Scan Attempt
  • Detecting SYN/FIN DDOS Attempt
  • Detecting UDP Scan Attempt
  • Detecting Password Cracking Attempts
  • Detecting FTP Password Cracking Attempts
  • Detecting Sniffing (MITM) Attempts
  • Detecting the Mac Flooding Attempt
  • Detecting the ARP Poisoning Attempt
  • Additional Packet Sniffing Tools
  • Network Monitoring and Analysis
  • Bandwidth Monitoring

Module 12: Network Risk and Vulnerability Management

  • What is Risk?
  • Risk Levels
  • Risk Matrix
  • Key Risk Indicators(KRI)
  • Risk Management Phase
  • Enterprise Network Risk Management
  • Vulnerability Management

Module 13: Data Backup and Recovery

  • Introduction to Data Backup
  • RAID (Redundant Array Of Independent Disks) Technology
  • Storage Area Network (SAN)
  • Network Attached Storage (NAS)
  • Selecting Appropriate Backup Method
  • Choosing the Right Location for Backup
  • Backup Types
  • Conducting Recovery Drill Test
  • Data Recovery
  • Windows Data Recovery Tool
  • RAID Data Recovery Services
  • SAN Data Recovery Software
  • NAS Data Recovery Services

Module 14: Network Incident Response and Management

  • Incident Handling and Response
  • Incident Response Team Members: Roles and Responsibilities
  • First Responder
  • Incident Handling and Response Process
  • Overview of IH&R Process Flow

Read more ...

Interested? See prices or call 080 80 800 888

You will sit the Certified Network Defender (CND) 312-38 exam on-site as part of the course. This is covered by your Certification Guarantee.

  • Exam Title: CND
  • Exam code: 312-38
  • Number of questions: 100
  • Duration: 4 Hours
  • Availability: ECC Exam
  • Test Format: Interactive Multiple Choice Questions

Read more ...

Interested? See prices or call 080 80 800 888

As part of your accelerated course, you'll get access to EC-Council Official Curriculum.

Firebrand Training offers top-quality technical education and certification training in an all-inclusive course package specifically designed for the needs and ease of our students. We attend to every detail so our students can focus solely on their studies and certification goals.

Our Accelerated Learning Programmes include:

  • Intensive Hands-on Training Utilising our (Lecture | Lab | Review)TM Delivery
  • Comprehensive Study Materials, Program Courseware and Self-Testing Software including MeasureUp *
  • Fully instructor-led program with 24 hour lab access
  • Examination vouchers **
  • On site testing ***
  • Accommodation, all meals, unlimited beverages, snacks and tea / coffee****
  • Transportation to/from designated local railway stations
  • Examination Passing Policy

Our instructors teach to accommodate every student's learning needs through individualised instruction, hands-on labs, lab partner and group exercises, independent study, self-testing, and question/answer drills.

Firebrand Training has dedicated, well-equipped educational facilities where you will attend instruction and labs and have access to comfortable study and lounging rooms. Our students consistently say our facilities are second-to-none.

Firebrand goes digital

We’re currently migrating from printed to digital courseware. Some courseware is already available in digital, while other books remain in printed form. To find out if this course is digital, call us on 080 80 800 888.

There are several benefits of easy-to-use digital courseware: downloads are immediate, and you’ll always have your courseware available wherever you are. You won’t need to wait for a printed book to be delivered before you start learning – and it’s better for the environment. You can choose to download the courseware to your own device, or borrow one of ours.

Considering a Microsoft course? Always have the most up-to-date Microsoft digital courseware with ‘Fresh Editions’. This gives you access to all versions of digital courseware – you’ll receive updates and revisions of your textbook, at no charge, for the life of that course.

Examination Passing Policy

Should a student complete a Firebrand Training Program without having successfully passed all vendor examinations, the student may re-attend that program for a period of one year.  Students will only be responsible for accommodations and vendor exam fees.

Please note

  • * Not on all courses
  • ** Examination vouchers are not included for the following courses: PMI, CISA, CISM, CGEIT, CRISC, CISSP CBK Review and CSX Practitioner Level 1,2 and 3
  • *** On site testing is not included in our PMI, CISA, CISM, CGEIT, CRISC, CSX Practitioner or ITIL Managers and Revision Certifications
  • **** Accommodation not included on the CISSP CBK Review Seminar

Read more ...

Interested? See prices or call 080 80 800 888

There are currently no prerequisites for this course but having a basic understanding of Network Security will help.

Unsure whether you meet the prerequisites?

Don’t worry - we’ll discuss your technical background, experience and qualifications to determine whether this accelerated course suits you.

Just call us on 080 80 800 888 and speak to one of our enrolment consultants.

Firebrand is an immersive environment and requires commitment. Some prerequisites are simply guidelines; you may find your unique experience, attitude and determination enables you to succeed on your accelerated course.

Interested? See prices or call 080 80 800 888