24x7 Accessibility to learning resources
Complete exam guidance
EC-Council Accredited Training Partner (ATP)
Extensive hands-on and live case practical training
- Individuals interested in a cybersecurity career.
- Those who wish to qualify for entry-level roles such as Entry-level Network Administrators, Entry-level Network Security Administrators, Data Security Analysts, Junior Network Security Engineers, Junior Network Defense Technicians, Security Analysts, and Security Operators.
- IT professionals exploring career transitions.
- Cisco or Microsoft-certified Network Administrators/Engineers.
- Wireshark-certified Network Analysts.
- SolarWinds/Juniper/CompTIA Network+ or Security+ accredited professionals.
- Associated Job Roles:
Cyber Security Analysts (Senior/Principal).
Vulnerability Analysts (Principal).
Staff Network Engineers.
Information Systems Security Managers.
Mid-level Penetration Testers.
Staff Network Engineers.
Sr. Digital Forensics Analysts.
Linux System Administrators.
Cybersecurity Engineers II Red Team.
- The ones willing to complete EC-Council's CND qualification.
- Fundamental knowledge of networking concepts.
- Those trying to attempt the CND exam without official EC-Council training must show a minimum of 2 years of work experience in the InfoSec domain.
- Understand network security management.
- The basics of first response and forensics.
- Establish network security policies and procedures.
- Learn the indicators of Compromise, Attack, and Exposures (IoC, IoA, IoE).
- Windows and Linux security administration.
- Build threat intelligence capabilities.
- Set up mobile and IoT device security.
- Establish/Monitor log management.
- Implement data security techniques on networks.
- Implement endpoint security.
- Embed virtualization technology security.
- Configure optimum firewall solutions.
- Determine cloud and wireless security.
- Understand and utilize IDS/IPS technologies.
- Deploy and use risk assessment tools.
- Establish Network Authentication, Authorization & Accounting (AAA).
About The Examinnation
- Exam: 312-38.
- Skills Tested: Network Defense Management and Perimeter Protection,
Endpoint and Application/Data Protection,
Enterprise Virtual/Cloud and Wireless Network Protection
& Incident Detection, Response and Prediction.
- Certification Awarded: The Certified Network Defender.
- Exam Format: 100 Multiple-choice Questions with 60-85% Cut Scores.
- Duration: 4 Hours.
- EC-Council Accredited Training Partner
- Authorized Content
- Experienced Subject Matter Experts
- 24*7 leaner assistance and support
- Network Attacks & Defense Strategies
Explaining essential terminologies related to network security attacks.
Describing various examples of network-level attack techniques.
Examples of host-level attack techniques.
Examples of application-level attack techniques.
Examples of social engineering attack techniques.
Examples of email attack techniques.
Describing examples of mobile device-specific attack techniques.
Cloud-specific attack techniques.
Wireless network-specific attack techniques.
Describing an attacker’s hacking methodologies and frameworks.
Understanding fundamental goals, benefits, and challenges in network defense.
Explaining the continual/adaptive security strategy.
The defense-in-depth security strategy.
- Administrative Network Security
Obtaining compliance with regulatory frameworks.
Discussing regulatory frameworks, laws, and acts.
Designing and developing security policies.
Conducting security awareness training.
Discussing other administrative security measures.
- Technical Network Security
Discussing access control principles, terminologies, and models.
Redefining Access Control security in today’s distributed and mobile computing world.
Discussing Identity and Access Management (IAM) concepts.
Cryptographic security techniques and cryptographic algorithms.
The security benefits of network segmentation techniques.
The essential network security solutions.
Discussing the critical network security protocols.
- Network Perimeter Security
Understanding firewall security concerns, capabilities, and limitations.
Different types of firewall technologies and their usage.
Firewall topologies and their use.
Distinguishing between hardware, software, host, network, internal, and external firewalls.
Selecting a firewall based on its deep traffic inspection capability.
Discussing the firewall implementation/deployment process.
Recommendations and best practices for a secure firewall implementation/deployment.
Firewall administration activities.
Understanding the role, capabilities, limitations, and concerns in IDS deployments.
Discussing the IDS/IPS classification.
Various components of IDS.
The effective deployment of network and host-based IDS.
Learning to deal with false positive/negative IDS alerts.
Discussing the selection of appropriate IDS solutions.
Various NIDS/HIDS solutions with their intrusion detection capabilities.
Router/Switch security measures, recommendations, and best practices.
Leveraging Zero Trust Model Security using Software-Defined Perimeter (SDP).
- Endpoint Security-Windows Systems
Understanding Windows OS and security concerns.
Discussing Windows security components.
Various Windows security features.
Windows security baseline configurations.
Windows user account and password management.
Windows patch management.
User access management.
Windows OS security-hardening techniques.
Windows active directory security best practices.
Windows network services and protocol security.
- Endpoint Security-Linux Systems
Understanding Linux OS and security concerns.
Discussing Linux installation and patching.
Linux OS Hardening techniques.
Linux user access and password management.
Linux network and remote access security.
Various Linux security tools/frameworks.
- Endpoint Security- Mobile Devices
Discussing common mobile usage policies in enterprises.
The security risks/challenges associated with enterprise mobile usage policies.
The security guidelines for mitigating risks associated with enterprise mobile usage policies.
Discussing/Implementing enterprise-level mobile security management solutions.
General security guidelines and best practices on mobile platforms.
Discussing security guidelines and tools for android devices.
Security guidelines and tools for iOS devices.
- Endpoint Security-IoT Devices
Understanding IoT devices, their need, and application areas.
The IoT ecosystem and communication models.
The security challenges/risks associated with IoT-enabled environments.
Discussing the security in IoT-enabled environments.
Security measures for IoT-enabled environments.
IoT security tools and best practices.
Discussing/Referring to various standards, initiatives, and efforts for IoT security.
- Administrative Application Security
Discussing/Implementing application whitelisting and blacklisting.
Application patch management.
The Web Application Firewall (WAF).
- Data Security
Understanding data security and its importance.
Discussing the implementation of data access controls.
The encryption of Data-at-rest.
Data-at-transit, and Data-at-transit between browser and web server.
The encryption of Data-at-transit in email delivery.
Data masking concepts, backup, and retention.
Data destruction and Data Loss Prevention (DLP) concepts.
- Enterprise Virtual Network Security
Understanding the essential virtualization concepts.
Discussing Network Virtualization (NV) security.
Software-defined Network (SDN) security.
Network Function Virtualization (NFV) security.
OS Virtualization security.
The security guidelines, recommendations, and best practices for Containers/Dockers/Kubernetes.
- Enterprise Cloud Network Security
Understanding the cloud computing fundamentals.
The insights of cloud security.
Evaluating CSP for security before consuming cloud service.
Discussing security in Amazon (AWS)/Microsoft Azure clouds and the Google Cloud Platform (GCP).
The general security best practices and tools for cloud security.
- Enterprise Wireless Network Security
Understanding wireless network fundamentals, encryption mechanisms, and authentication methods.
Discussing and implementing wireless network security measures.
- Network Traffic Monitoring & Analysis
Understanding the need/advantages of network traffic monitoring.
Setting up the environment for network monitoring.
Determining baseline traffic signatures for normal/suspicious network traffic.
Performing network monitoring/analysis for suspicious traffic using Wireshark.
Discussing network performance and bandwidth monitoring concepts.
- Network Logs Monitoring & Analysis
Understanding the logging concepts.
Discussing log monitoring and analysis on Windows, Linux, or Mac systems.
Discussing log monitoring and analysis on Firewalls, Routers, or Web servers.
Discussing the centralized log monitoring/analysis.
- Incident Response & Forensic Investigation
Understanding the incident response concept and role of a first responder.
Discussing the Do’s/Don’ts in the first response.
Describing incident-handling/response and forensics investigation processes.
- Business Continuity & Disaster Recovery
Business Continuity (BC) and Disaster Recovery (DR) introduction.
Discussing BC/DR activities.
Explaining Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP).
Discussing BC/DR standards.
- Risk Anticipation with Risk Management
Understanding risk management concepts.
Learning to manage risks through a risk management program.
Different Risk Management Frameworks (RMF).
Managing vulnerabilities through the vulnerability management program.
Learning vulnerability assessment and scanning.
- Threat Assessment with Attack Surface Analysis
Understanding the attack surface analysis and visualizing your attack surface.
Learning to identify Indicators of Exposures (IoE).
Conducting attack simulations.
Reducing the attack surface.
- Threat Prediction with Cyber Threat Intelligence
Understanding the role of cyber threat intelligence in network defense.
The types of threat intelligence.
The indicators of threat intelligence: Indicators of Compromise (IoCs) and Indicators of Attack (IoA).
The layers of threat intelligence.
Learning to leverage and consume threat intelligence for proactive defense.
It is the only true blue-team comprehensive network defense program that incorporates critical secure network skills and pays enhanced attention to threat prediction, business continuity, or disaster recovery.
It comprises Protect, Detect, Respond, and Predict for efficiently responding to network attacks and stopping them before they happen.
Adequately Designed, Implemented, and Enforced Security Policies.
Right Selection of Security Controls.
Business Continuity (BC).
Disaster Recovery (DR).
Attack Surface Analysis.
It is based on common job role frameworks recognized by organizations worldwide. Moreover, the CND takes your employees through multiple latest technologies ranging from Cloud, IoT, Virtualization and Remote Worker Threats, Attack Surface Analysis to SDN, Network Function Virtualization (NFV), docker, Kubernetes, and container security.
Altogether, the CND v2 training and certification facilitate impregnable cyber defense practices within your enterprise.
The Certified Network Defender v2 program acts as your pathway to a career in a blue team by helping you learn beyond the technological aspects of network security. It explains various ways of ensuring security across cloud platforms, from Amazon Web Services to Microsoft Azure Cloud and Google Cloud.
At the same time, the CND course allows you to acquire skills for building perimeter defense. Its 80+ complex labs present ample opportunities to learn under simulated threat environments while gaining real-world skills before starting a professional career.
It enables them to identify the parts of an organization that need to be reviewed/tested for security vulnerabilities and work on reducing, preventing, or mitigating risks in the network.
It could depend on the job profile and experience; however, as per PayScale, the average Network Security Engineer may earn an annual package of $87,000, and yearly salaries can go as high as $112,000.
Yes, acknowledging the projected 27% of corporate data traffic bypassing perimeter security and flowing directly from mobile/portable devices to the cloud, the CND v2 stresses the Enterprise Mobile Device Security and redefines Access Control Security.
It can be described as the most practical network security/defense training ever, and as hands-on as network defense can get. Based on a thorough job task analysis, over 50% of the CND course is lab-intensive to ensure the application of real-world skills.
Only 1 ECC exam: 312-38.
Besides being a globally-respected Individual/Corporate IT training provider, Vinsys is also admired as the top EC-Council Accredited Training Partner (ATP). Its unmatchable offerings, accredited instructors, customizable skilling programs, and round-the-clock learner support ensure the most detailed upskilling experiences, a must for capitalizing on valuable network security opportunities.