Alert:

This is the sole official MRGT platform. All information on our partners and affiliates is published here. Any individual or organization claiming association outside this site is unauthorized, and MRGT accepts no responsibility for their training programs, services, or any other engagements.
Network Defense Essentials (N|DE)

Course Outline

Module 01:Network Security Fundamentals
Module 02: Identification, Authentication, and Authorization
Module 03: Network Security Controls: Administrative Controls
Module 04: Network Security Controls: Physical Controls
Module 05: Network Security Controls: Technical Controls
Module 06: Virtualization and Cloud Computing
Module 07: Wireless Network Security
Module 08: Mobile Device Security
Module 09: IoT Device Security
Module 10: Cryptography and the Public Key Infrastructure
Module 11: Data Security
Module 12: Network Traffic Monitoring

Course Outline

Module 01: Information Security Fundamentals
Module 02: Ethical Hacking Fundamentals
Module 03: Information Security Threats and Vulnerability Assessment
Module 04: Password Cracking Techniques and Countermeasures
Module 05: Social Engineering Techniques and Countermeasures
Module 06: Network Level Attacks and Countermeasures
Module 07: Web Application Attacks and Countermeasures
Module 08: Wireless Attacks and Countermeasures
Module 09: Mobile Attacks and Countermeasures
Module 10: IOT & OT Attacks and Countermeasures
Module 11: Cloud Computing Threats and Countermeasures
Module 12: Penetration Testing Fundamentals

Course Outline

Module 01: Computer Forensics Fundamentals
Module 02: Computer Forensics Investigation Process
Module 03: Understanding Hard Disks and File Systems
Module 04: Data Acquisition and Duplication
Module 05: Defeating Anti-forensics Techniques
Module 06: Windows Forensics
Module 07: Linux and Mac Forensics
Module 08: Network Forensics
Module 09: Investigating Web Attacks
Module 10: Dark Web Forensics
Module 11: Investigating Email Crimes
Module 12: Malware Forensics