ECCouncil 312-38 Certified Network Defender Exam

Become a Certified Network Defender
The Certified Network Defender (CND) certification program focuses on creating Network Administrators who are trained on protecting, detecting and responding to the threats on the network. Network administrators are usually familiar with network components, traffic, performance and utilization, network topology, location of each system, security policy, etc. A CND will get the fundamental understanding of the true construct of data transfer, network technologies, software technologies so that the they understand how networks operate, understand what software is automating and how to analyze the subject material. In addition, network defense fundamentals, the application of network security controls, protocols, perimeter appliances, secure IDS, VPN and firewall configuration, intricacies of network traffic signature, analysis and vulnerability scanning are also covered which will help the Network Administrator design greater network security policies and successful incident response plans. These skills will help the Network Administrators foster resiliency and continuity of operations during attacks.

CND is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE).

Certification Target Audience
The CND certification is for:
Network Administrators
Network security Administrators
Network Security Engineer
Network Defense Technicians
CND Analyst
Security Analyst
Security Operator
Anyone who involves in network operations

Exam Information
Candidate is required to pass exam 312-38 to achieve Certified Network Defender (CND) certification.

CND Exam Details
Exam Duration 4 Hours
Number of Questions 100
Hand Book Blue Print

Passing Criteria:
In order to maintain the high integrity of our certifications exams, EC-Council Exams are provided in multiple forms (I.e. different question banks). Each form is carefully analyzed through beta testing with an appropriate sample group under the purview of a committee of subject matter experts that ensure that each of our exams not only have academic rigor but also have “real world” applicability. We also have a process to determine the difficulty rating of each question . The individual rating then contributes to an overall “Cut Score” for each exam form. To ensure each form has equal assessment standards, cut scores are set on a “per exam form” basis. Depending on which exam form is challenged, cut scores can range from 60% to 85%.

Clause: Age Requirements and Policies Concerning Minors
The age requirement for attending the training or attempting the exam is restricted to any candidate that is at least 18 years old.

If the candidate is under the age of 18, they are not eligible to attend the official training or eligible to attempt the certification exam unless they provide the accredited training center/EC-Council a written consent of their parent/legal guardian and a supporting letter from their institution of higher learning. Only applicants from nationally accredited institution of higher learning shall be considered.

Disclaimer: EC-Council reserves the right to impose additional restriction to comply with the policy. Failure to act in accordance with this clause shall render the authorized training center in violation of their agreement with EC-Council. EC-Council reserves the right to revoke the certification of any person in breach of this requirement.

EC-CouncilCND Exam Blueprint v2.0
CertifiedDNetworkDefenderNCEC-CouncilCND Exam Blueprint v2.0
CertifiedDNetworkDefenderNC

Domains Objectives Weightage Number of

1. Computer Network and Defense Fundamentals
Understanding computer network
Describing OSI and TCP/IP network Models
Comparing OSI and TCP/IP network Models
Understanding different types of networks
Describing various network topologies
Understanding various network components
Explaining various protocols in TCP/IP protocol stack
Explaining IP addressing concept
Understanding Computer Network Defense (CND)
Describing fundamental CND attributes
Describing CND elements
Describing CND process and approaches

2. Network
Security Threats,
Vulnerabilities, and Attacks
Understanding threat, attack, and vulnerability
Discussing network security concerns
Reasons behind network security concerns
Effect of network security breach on business continuity
Understanding different types of network threats
Understanding different types of network security vulnerabilities
Understanding different types of network attacks
Describing various network attacks

3. Network Security
Controls, Protocols,  and Devices
Understanding fundamental elements of network security
Explaining network access control mechanism
Understanding different types of access controls
Explaining network Authentication, Authorization and Auditing (AAA) mechanism
Explaining network data encryption mechanism
Describing Public Key Infrastructure (PKI)
Describing various network security protocols
Describing various network security devices

4. Network Security
Policy Design and Implementation
Understanding security policy
Need of security policies
Describing the hierarchy of security policy
Describing the characteristics of a good security policy
Describing typical content of security policy
Understanding policy statement
Describing steps for creating and implementing security policy
Designing of security policy
Implementation of security policy
Describing various types of security policy
Designing of various security policies
Discussing various information security related standards, laws and acts

5. Physical Security
Understanding physical security
Importance of physical security
Factors affecting physical security
Describing various physical security controls
Understanding the selection of Fire Fighting Systems
Describing various access control authentication techniques
Understanding workplace security
Understanding personnel security
Describing Environmental Controls
Importance of physical security awareness and training

6. Host Security
Understanding host security
Understanding the importance of securing individual hosts
Understanding threats specific to hosts
Identifying paths to host threats
Purpose of host before assessment
Describing host security baselining
Describing OS security baselining
Understanding and describing security requirements for different types of servers
Understanding security requirements for hardening of routers
Understanding security requirements for hardening of switches
Understanding data security concerns when data is at rest, in use, and in motion
Understanding virtualization security

7. Secure Firewall
Configuration and Management
Understanding firewalls
Understanding firewall security concerns
Describing various firewall technologies
Describing firewall topologies
Appropriate selection of firewall topologies
Designing and configuring firewall ruleset
Implementation of firewall policies
Explaining the deployment and implementation of firewall
Factors to considers before purchasing any firewall solution
Describing the configuring, testing and deploying of firewalls
Describing the management, maintenance and administration of firewall implementation
Understanding firewall logging
Measures for avoiding firewall evasion
Understanding firewall security best practices

8. Secure IDS • Understanding different types of intrusions and their Configuration and indications Management
• Understanding IDPS
• Importance of implementing IDPS
• Describing role of IDPS in network defense
• Describing functions, components, and working of IDPS
• Explaining various types of IDS implementation
• Describing staged deployment of NIDS and HIDS
• Describing fine-tuning of IDS by minimizing false positive and false negative rate
• Discussing characteristics of good IDS implementation
• Discussing common IDS implementation mistakes and their remedies
• Explaining various types of IPS implementation
• Discussing requirements for selecting appropriate IDPS product
• Technologies complementing IDS functionality

9. Secure VPN
• Understanding Virtual Private Network (VPN) and its Configuration and working Management
• Importance of establishing VPN
• Describing various VPN components
• Describing implementation of VPN concentrators and its functions
• Explaining different types of VPN technologies
• Discussing components for selecting appropriate VPN technology
• Explaining core functions of VPN
• Explaining various topologies for implementation of VPN
• Discussing various VPN security concerns
• Discussing various security implications to ensure VPN security and performance

10. Wireless Network • Understanding wireless network Defense
• Discussing various wireless standards
• Describing various wireless network topologies
• Describing possible use of wireless networks
• Explaining various wireless network components
• Explaining wireless encryption (WEP, WPA,WPA2) technologies
• Describing various authentication methods for wireless networks
• Discussing various types of threats on wireless networks
• Creation of inventory for wireless network components
• Appropriate placement of wireless Access Point (AP)
• Appropriate placement of wireless antenna
• Monitoring of wireless network traffic
• Detection and locating of rogue access points
• Prevention of wireless network from RF interference
• Describing various security implications for wireless network

11. Network Traffic Monitoring and Analysis
Understanding network traffic monitoring
Importance of network traffic monitoring
Discussing techniques used for network monitoring and analysis
Appropriate position for network monitoring
Connection of network monitoring system with managed switch
Understanding network traffic signatures
Baselining for normal traffic
Disusing the various categories of suspicious traffic signatures
Various techniques for attack signature analysis
Understanding Wireshark components, working and features
Demonstrating the use of various Wireshark filters
Demonstrating the monitoring LAN traffic against policy violation
Demonstrating the security monitoring of network traffic
Demonstrating the detection of various attacks using Wireshark
Discussing network bandwidth monitoring and performance improvement

12. Network Risk and Vulnerability Management
Understanding risk and risk management
Key roles and responsibilities in risk management
Understanding Key Risk Indicators (KRI) in risk management
Explaining phase involves in risk management
Understanding enterprise network risk management
Describing various risk management frameworks
Discussing best practices for effective implementation of risk management
Understanding vulnerability management
Explaining various phases involved in vulnerability management
Understanding vulnerability assessment and its importance
Discussing requirements for effective network vulnerability assessment
Discussing internal and external vulnerability assessment
Discussing steps for effective external vulnerability assessment
Describing various phases involve in vulnerability assessment
Selection of appropriate vulnerability assessment tool
Discussing best practices and precautions for deploying vulnerability assessment tool
Describing vulnerability reporting, mitigation, remediation and verification

13. Data Backup and Recovery
Understanding data backup
Describing the data backup plan
Describing the identification of data to backup
Determining the appropriate backup medium for data backup
Understanding RAID backup technology and its advantages
Describing RAID architecture
Describing various RAID levels and their use
Selection of appropriate RAID level
Understanding Storage Area Network (SAN) backup technology and its advantages
Best practices of using SAN
Understanding Network Attached Storage (NAS) backup technology and its advantages
Describing various types of NAS implementation

14. Network Incident Response and Management
Understanding Incident Handling and Response (IH&R)
Roles and responsibilities of Incident Response Team (IRT)
Describing role of first responder
Describing first response activities for network administrators
Describing Incident Handling and Response (IH&R) process
Understanding forensic investigation
People involved in forensics investigation
Describing forensics investigation methodology

Actualkey ECCouncil 312-38 exam pdf, Certkingdom ECCouncil 312-38 PDF

MCTS Training, MCITP Trainnig

Best ECCouncil 312-38 Certification, ECCouncil 312-38 Training at certkingdom.com

Click to rate this post!
[Total: 0 Average: 0]