Uploaded on Dec 29, 2020
With the wake of COVID-19, organizations have enabled workplace flexibility for their employees by promoting work from home culture. Thus, providing hackers an opportunity to exploit the vulnerable points and take advantage of the human factor. According to Tessian, 45% of respondents mentioned distraction as the reason for falling for a phishing scam while working from home.
                     What’s new in CND v2.0
                     www.infosectrain.com
What’s new in CND v2.0
InfosecTrain
About Us
InfosecTrain is one of the finest Security and Technology Training and Consulting organization, focusing on a range of IT 
Security Trainings and Information Security Services. InfosecTrain was established in the year 2016 by a team of 
experienced and enthusiastic professionals, who have more than 15 years of industry experience. We provide professional 
training, certification & consulting services related to all areas of Information Technology and Cyber Security.
Overv iew
W i t h  t h e  w a k e  o f  C O V I D - 1 9 ,  o r g a n i z a t i o n s  h a v e  e n a b l e d  w o r k p l a c e  
f l e x i b i l i t y  f o r  t h e i r  e m p l o y e e s  b y  p r o m o t i n g  w o r k  f r o m  h o m e  c u l t u r e .  T h u s ,  
p r o v i d i n g  h a c k e r s  a n  o p p o r t u n i t y  t o  e x p l o i t  t h e  v u l n e r a b l e  p o i n t s  a n d  t a k e  
a d v a n t a g e  o f  t h e  h u m a n  f a c t o r .  A c c o r d i n g  t o  T e s s i a n ,  4 5 %  o f  r e s p o n d e n t s  
m e n t i o n e d  d i s t r a c t i o n  a s  t h e  r e a s o n  f o r  f a l l i n g  f o r  a  p h i s h i n g  s c a m  w h i l e  
w o r k i n g  f r o m  h o m e .  I n  t h e  2 0 2 0  D a t a  B r e a c h  I n v e s t i g a t i o n s  R e p o r t  b y  
V e r i z o n ,  w e b  a p p l i c a t i o n  a t t a c k s  h a v e  i n c r e a s e d  t w i c e  a s  c o m p a r e d  t o  
2 0 1 9 .  W h i l e  w e  a r e  n o w  c o m f o r t a b l e  w i t h  w o r k  f r o m  h o m e  e n v i r o n m e n t ,  
i n i t i a l l y ,  n o t  e v e r y o n e  w a s  p r e p a r e d ;  t h u s ,  m a n y  e m p l o y e e s  w e r e  w o r k i n g  
w i t h  p e r s o n a l  l a p t o p s  w i t h  i n a d e q u a t e  s e c u r i t y  c o n t r o l s .  D a t a  f l o w i n g  
t h r o u g h  t h e s e  s e t t i n g s  e x p o s e  t h e  e n t i r e  n e t w o r k  t o  r i s k .  T o  c o n t r o l  t h e s e  
k i n d s  o f  s i t u a t i o n s ,  c o m p a n i e s  a r e  n o w  m o v i n g  t o  a  s e g m e n t e d  n e t w o r k  
i n s t e a d  o f  a  f l a t  n e t w o r k  a n d  s i m i l a r  n e w  r e q u i r e m e n t s  a r e  a r i s i n g  f o r  
d e f e n d i n g  t h e  o r g a n i z a t i o n ’ s  n e t w o r k .
4 C C I S O  C e r t i fi c a t i o n
  
W i t h  s e c u r i t y  i n  m i n d  a n d  t h e  a i m  o f  e m p o w e r i n g  t h e  d e f e n d e r s ,  E C -
c o u n c i l  h a s  a n n o u n c e d  C N D v 2 .  I n s t e a d  o f  a  l i n e a r  a p p r o a c h ,  a  c o n t i n u o u s  
a d a p t i v e  s e c u r i t y  c y c l e  i s  t h e  n e e d  o f  t h e  h o u r .  C N D v 2  p r o v i d e s  a  
c o m p r e h e n s i v e  a p p r o a c h  t o  d e a l  w i t h  m o d e r n  n e t w o r k  s e c u r i t y  i s s u e s .
M o v i n g  f r o m  t h e  t r a d i t i o n a l  c y b e r s e c u r i t y  a p p r o a c h  o f  “ p r o t e c t  a n d  
d e t e c t , ”  C N D v 2  m o v e s  a  s t e p  a h e a d  t o w a r d s  “ P r e d i c t ,  P r o t e c t ,  D e t e c t ,  
R e s p o n d . ”
5
 
6
C o u r s e  O b j e c t i v e s  f o r  C N D v 2
C N D v 2  h a s  a d d e d  a n d  r e m o v e d  d o m a i n s  b a s e d  o n  t h e  c u r r e n t  c y b e r s e c u r i t y  
m a r k e t  a n a l y s i s  a n d  r e q u i r e m e n t .  T h e  n e w  v e r s i o n  i s  b a s e d  o n  t h e  
c y b e r s e c u r i t y  e d u c a t i o n  f r a m e w o r k  a n d  w o r k  r o l e  t a s k  a n a l y s i s  p r e s e n t e d  
b y  t h e  N a t i o n a l  I n i t i a t i v e  o f  C y b e r s e c u r i t y  E d u c a t i o n  ( N I C E ) .  A s  c o m p a r e d  
t o  1 4  d o m a i n s  i n  C N D v 1 ,  C N D v 2  c o n s i s t s  o f  2 0  d o m a i n s .  T h e  n e w  C N D v 2  
c e r t i f i c a t i o n  e x a m  v a l i d a t e s  t h e  c a n d i d a t e  o n  a l l  c r i t i c a l  a s p e c t s  o f  t h e  
i n f o r m a t i o n  a n d  n e t w o r k  s e c u r i t y  a n d  h e l p s  t h e m  g a i n  a n  i n - d e p t h  
u n d e r s t a n d i n g  o f :
 M o d e r n  n e t w o r k  a t t a c k s  a n d  t h e i r  d e f e n s e  s t r a t e g i e s
 V a r i o u s  a s p e c t s  o f  n e t w o r k  s e c u r i t y  c o n t r o l s ,  i n c l u d i n g  t e c h n i c a l ,  
a d m i n i s t r a t i v e  a n d  p e r i m e t e r  s e c u r i t y
 S e c u r i n g  e n t r y  p o i n t s  o r  e n d - u s e r  d e v i c e s  b y  e n s u r i n g  e n d p o i n t  s e c u r i t y  
o f  W i n d o w s ,  L i n u x ,  I o T  a n d  m o b i l e  d e v i c e s .
 C o n c e p t  o f  d a t a  s t o r a g e ,  d a t a  c l a s s i f i c a t i o n ,  d a t a  m a s k i n g ,  r e t e n t i o n  a n d  
d e s t r u c t i o n
 A d m i n i s t r a t i v e  a p p l i c a t i o n  s e c u r i t y  a n d  i t s  r o l e  i n  m i n i m i z i n g  t h e  s e c u r i t y  
v u l n e r a b i l i t i e s  i n  t h e  a p p l i c a t i o n
 I o T  c o n c e p t s ,  t h r e a t s  a n d  c o u n t e r m e a s u r e s
7
  
 C o r e  e s s e n t i a l s  o f  v i r t u a l i z a t i o n  a n d  i t s  s e c u r i t y  i n  a n  e n t e r p r i s e  e n v i r o n m e n t ,  
s o f t w a r e  d e f i n e d  n e t w o r k  ( S D N )  s e c u r i t y ,  n e t w o r k  f u n c t i o n  v i r t u a l i z a t i o n  ( N F V )  
s e c u r i t y
 C l o u d  c o m p u t i n g ,  t h r e a t s ,  c h a l l e n g e s  a n d  s e c u r i t y  a c r o s s  c l o u d  p l a t f o r m s  ( A W S ,  
A z u r e ,  G o o g l e  C l o u d ) ,  c o n t a i n e r  s e c u r i t y ,  d o c k e r  s e c u r i t y ,  a n d  K u b e r n e t e s  
s e c u r i t y
 W i r e l e s s  n e t w o r k  s e c u r i t y
 M o n i t o r i n g  a n d  a n a l y s i s  o f  n e t w o r k  t r a f f i c  f o r  a n o m a l y  d e t e c t i o n
 A n a l y s i s  a n d  m o n i t o r i n g  o f  l o g s  a n d  e v e n t s  f o r  i d e n t i f i c a t i o n  o f  a n y  s u s p i c i o u s  
a c t i v i t y  o r  a  p o t e n t i a l  i n c i d e n t
 I n c i d e n t  m a n a g e m e n t  r e s p o n s e  p r o c e s s  t o  d e a l  w i t h  s e c u r i t y  i n c i d e n t s  a n d  
u n d e r s t a n d i n g  o f  f o r e n s i c s  i n v e s t i g a t i o n  t e c h n i q u e s
 R i s k  a n t i c i p a t i o n  a n d  m a n a g e m e n t ,  r i s k  a s s e s s m e n t ,  t e c h n i q u e s  o f  r i s k  
a v o i d a n c e ,  p r e v e n t i o n ,  m i t i g a t i o n  a n d  a c c e p t a n c e
 B u s i n e s s  c o n t i n u i t y  p l a n n i n g  a n d  d i s a s t e r  r e c o v e r y  c o n c e p t s  a n d  e s s e n t i a l s
 P e r f o r m i n g  t h r e a t  a s s e s s m e n t  a n d  a n a l y s i s  o f  t h e  a t t a c k  s u r f a c e ,  i d e n t i f i c a t i o n  
o f  v u l n e r a b l e  a r e a s  a n d  t h e i r  t e s t i n g
 T h r e a t  i n t e l l i g e n c e  f u n d a m e n t a l s  a n d  i t s  u t i l i z a t i o n  i n  m o v i n g  t o w a r d s  a  b e t t e r  
a n d  p r o a c t i v e  s e c u r i t y  a p p r o a c h
8
 
9
  
C o m p a r e d  t o  C N D v 1 ,  C N D v 2  h a s  a l m o s t  d o u b l e  t h e  n u m b e r  o f  l a b s ,  w h i c h  g i v e s  
c a n d i d a t e s  a  c h a n c e  t o  g e t  e x t e n s i v e  h a n d s - o n  o n  v a r i o u s  t o o l s  a n d  c l e a r  t h e i r  
c o n c e p t s  a b o u t  t h e  u n d e r l y i n g  t e c h n o l o g i e s .
T h e  e x a m  f o r m a t  a n d  o t h e r  a s p e c t s  s u c h  a s  t h e  e l i g i b i l i t y  c r i t e r i a ,  d u r a t i o n  o f  t h e  
e x a m  r e m a i n  t h e  s a m e .  H o w e v e r ,  C N D v 2  o f f e r s  a  m u c h  w i d e r  r a n g e  o f  t o p i c s  t o  
p r o v i d e  a  b e t t e r  u n d e r s t a n d i n g  o f  n e t w o r k  s e c u r i t y  i n  t h e  c u r r e n t  c y b e r s e c u r i t y  
e n v i r o n m e n t .
10
11
A B O U T  O U R  C O M PA N Y
OUR CONTACT
InfosecTrain welcomes overseas customers to come and 
attend training sessions in destination cities across the globe 
and enjoy their learning experience at the same time.
https://www.facebook.com/Infosectr
+91-97736-67874
ain/
sales@infosectrain. https://www.linkedin.com/company/infos
ec-train/
com
www.infosectrain.c https://www.youtube.com/c/Infose
cTrain
om 
                                          
               
            
Comments