Palo Alto Networks
CompTIA
Unix/Linux
Project Management
Virtualization/Cloud
Security
Cisco
Microsoft
Business
Dod 8140 Training
Programming
Specialized
Course Overview:
This course is instructed with an instructor in the classroom with provided lab equipment and Cyber Range.
Students enrolled in the Certified Network Defender course, will gain a detailed understanding and hands on ability to function in real life situations involving network defense. They will gain the technical depth required to actively design a secure network in your organization. This program will be akin to learning math instead of just using a calculator.
This course gives you the fundamental understanding of the true construct of data transfer, network technologies, software technologies so that you understand how networks operate, understand what software is automating and how to analyze the subject material.
You will learn how to protect, detect and respond to, and predict threats on the network. This builds upon the typical knowledge and skills of Network Administrators in network components, traffic, performance and utilization, network topology, system locations, and security policies.
You will learn network defense fundamentals, the application of network security controls, protocols, perimeter appliances, secure IDS, VPN and firewall configuration. You will then learn the intricacies of network traffic signature, analysis and vulnerability scanning which will help you when you design greater network security policies and successful incident response plans. These skills will help you foster resiliency and continuity of operations during attacks.
This course supports a certification that is DoD approved 8570 Baseline Certificate and meets DoD 8140/8570 training requirements.

What’s Included:
- EC-Council official E-Courseware
- EC-Council iLabs access included for 6 months
- EC-Council official Certificate of Attendance
- CND Exam Voucher with 1 FREE RETAKE VOUCHER
Dates/Locations:
Date/Time | Event |
---|---|
09/15/2025 - 09/19/2025 08:00 -16:00 |
TN-545: Certified Network Defender TechNow, Inc, San Antonio TX |
Duration: 5 Days
Course Content:
- Module 01. Network and Defense Strategies
- Module 02. Administrative Network Security
- Module 03. Technical Network Security
- Module 04. Network Perimeter Security
- Module 05. Endpoint Security-Windows Systems
- Module 06. Endpoint Security- Linux Systems
- Module 07. Endpoint Security- Mobile Devices
- Module 08. Endpoint Security- IoT Devices
- Module 09. Administrative Application Security
- Module 10. Data Security
- Module 11. Enterprise Virtual Network Security
- Module 12. Enterprise Cloud Network Security
- Module 13. Enterprise Wireless Network Security
- Module 14. Network Traffic Monitoring and Analysis
- Module 15. Network Logs Monitoring and Analysis
- Module 16. Incident Response and Forensic Investigation
- Module 17. Business Continuity and Disaster Recovery
- Module 18. Risk Anticipation with Risk Management
- Module 19. Threat Assessment with Attack Surface Analysis
- Module 20. Threat Prediction with Cyber Threat Intelligence
Prerequisites:
- Basic network and host operations knowledge
- Experience commensurate with one to five years of network, host, or application administration
- TN-325:Security+ or equivalent
Courses to follow:
- TN-555: Certified Ethical Hacker v10 (CEH)
- TN-575: Open Source Network Security Monitoring
- TN-979: Intrusion Analyst Course
Target Audience:
Network Administrators, Network Security Administrators, Network Security Engineer, Network Defense Technicians, Network Analyst, Security Analyst, Security Operator, and anyone involved in network operations
About us:
TechNow has taught security courses for almost 30 years, before most certifications existed and has successfully moved students through certification programs associated with IAPP, SANS, EC-Council and ISC2. Our instructor maintains over a dozen security certifications and has been the director of a company with internationals sales in security training, consulting, and compliance.
Tech Now, Inc. is an accredited Training Center with Ec-Council.
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
TN-225: Network+ Skills Class is a five-day course that teaches students the fundamentals of networking. Through hands-on training, students learn the vendor-independent networking skills & concepts that affect all aspects of networking, such as installing & configuring the TCP/IP client.
Attendees to the TN-225: Network+ Skills Class will receive TechNow approved course materials and expert instruction.
Please Note: This course is designed with a focus on skills and is not a preparation course for certification.
Dates/Locations:
Duration 5 days
Course Objectives:
- Introduction Defining Networking
- Building a Network with OSI
- Hardware Concepts
- Ethernet Basics
- Modern Ethernet
- Non-Ethernet Networks
- Installing a Physical Network
- Wireless Networking
- Protocols
- TCP/IP
- Network Operating Systems
- Sharing Resources
- Going Large with TCP/IP
- TCP/IP & the Internet
- Remote Connectivity
- Protecting Your Network
- Interconnecting Network Operating Systems
- The Perfect Server
- Zen & the Art of Network Support
Prerequisites:
- A+ Skills Course or A+ Certification Course is recommended
Comments
Latest comments from students
User: dsm
Instructor comments: great presentation
Facilities comments: too cold
User: fillyok
Instructor comments: He has an excellent way of explaining things on the level that anyone can understand easily. I wasn't looking forward to this class at all but I'm really glad I attended now. I have a much clearer understanding of networking fundamentals that I never would've received via CBTs. I'd heard really good things about Tim Burkard's teaching skills and now I know they're true. I wouldn't mind taking other classes that he teaches,
Facilities comments: The facilities are really nice and there weren't any problems as far as I could tell. The hotel staff is very nice.
Like the class? Then let everyone know!
TechNow is in no way associated with SANS or GIAC, but has courses that are similar in subject matter:
- TN-345: Python for Penetration Testers
- TN-865: Wireshark Network Traffic and Security Analysis
- TN-901: Linux for Security Professionals
- TN-909: Windows Forensic Analysis
- TN-913: Cloud Security Fundamentals
- TN-919: Penetration Tester Course
- TN-929: Security Essentials Training Course
- TN-939: Hacker Techniques, Exploits, and Incident Handling Course
- TN-949: Certified Firewall Analyst Course
- TN-959: UNIX Security Administrator Course
- TN-969: Windows Security Administrator Course
- TN-979: Intrusion Analyst Course
- TN-989: Advanced Penetration Testing, Exploits, and Ethical Hacking Course
- TN-999: Reverse Engineering Malware Course
Course Overview:
TN-575: Open Source Network Security Monitoring teaches students how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools. No network is bullet proof and when attackers access your network, this course will show you how to build a security net to detect, contain, and control the attacker. Sensitive data can be monitored and deep packet and deep attachment analysis can be achieved. As organizations stand up a Security Operations Center (SOC) the enterprise NSM is the key ingredient to that SOC. This course not only teaches how to implement an NSM technologically, but how to effectively monitor an enterprise operationally. You will learn how to architect an NSM solution: where to deploy your NSM platforms and how to size them, stand-alone or distributed, and integration into packet analysis, interpret evidence, and integrate threat intelligence from external sources to identify sophisticated attackers. A properly implemented NSM is integral to incident response and provides the responders timely information to react to the incident. TN-575: Open Source Network Security Monitoring is a lab intensive environment with a cyber range that gives each student in-depth knowledge and practical experience monitoring live systems to include: Cisco, Windows, Linux, IoT, and Firewalls.
Attendees to TN-575: Open Source Network Security Monitoring class will receive TechNow approved course materials and expert instruction.
This Course is taught utilizing Security Onion or RockNSM as specified by the customer.
Dates/Locations:
Duration: 5 Days
Course Objective:
The focus of this course is to present a suite of Open Source security products integrated into a highly functional and scalable Network Security Monitoring solution.
Prerequisites:
Students should have a basic understanding of networks, TCP/IP and standard protocols such as DNS, HTTP, etc. Some Linux knowledge/experience is recommended, but not required
Course Outline:
- Network Security Monitoring (NSM) Methodology
- High Bandwidth Packet Capture Challenges
- Installation of Security Onion
- Use Cases (analysis, lab, stand-alone, distributed)
- Resource Requirements
- Configuration
- Setup Phase I – Network Configuration
- Setup Phase 2 – Service Configuration
- Evaluation Mode vs. Configuration Mode
- Verifying Services
- Security Onion Architecture
- Configuration Files and Folders
- Network Interfaces
- Docker Environment
- Security Onion Containers
- Overview of Security Onion Analyst Tools
- Kibana
- CapME
- CyberChef
- Squert
- Sguil
- NetworkMiner
- Quick Review of Wireshark and Packet Analysis
- Display and Capture Filters
- Analyze and Statistics Menu Options
- Analysis for Signatures
- Analyzing Alerts
- Replaying Traffic
- 3 Primary Interfaces:
- Squert
- Sguil
- Kibana
- Pivoting Between Interfaces
- Pivoting to Full Packet Capture
- Snort and Surricata
- Rule Syntax and Construction
- Implementing Custom Rules
- Implementing Whitelists and Blacklists
- Hunting
- Using Kibana to Slice and Dice Logs
- Hunting Workflow with Kibana
- Bro
- Introduction and Overview
- Architecture, Commands
- Understanding and Examining Bro Logs
- Using AWK, sort, uniq, and bro-cut
- Working with traces/PCAPs
- Bro Scripts Overview
- Loading and Using Scripts
- Bro Frameworks Overview
- Bro File Analysis Framework FAF
- Using Bro scripts to carve out more than files
- Introduction and Overview
- RockNSM ( * If Applicable)
- Kafka
- Installation and Configuration
- Kafka Messaging
- Brokers
- Integration with Bro and FSF
- File Scanning Framework FSF
- Custom YARA Signatures
- JSON Trees
- Sub-Object Recursion
- Bro and Suricata Integration
- Kafka
- Elastic Stack
- Adding new data sources in Logstash
- Enriching data with Logstash
- Automating with Elastalert
- Building new Kibana dashboards
- Production Deployment
- Advanced Setup
- Master vs Sensor
- Node Types – Master, Forward, Heavy, Storage
- Command Line Setup with sosetup.conf
- Architectural Recommendations
- Sensor Placement
- Hardening
- Administration
- Maintenance
- Tuning
- Using PulledPork to Disable Rules
- BPF’s to Filter Traffic
- Spinning up Additional Snort / Suricata / Bro Workers to Handle Higher Traffic Loads
Comments
Latest comments from students