Certified Network Defender: (CND v2)

Demanded by Employers. Respected by Peers.

For details on dates and prices please contact us

WHEN DEFENCE IS YOUR FOCUS

Certified Network Defender CND v2 provides a comprehensive approach to effectively deal with security issues in today’s modern network, which includes:

WE ARE AN ACCREDITED

EC Council Training and Exam Center

Certified Network Defender – (CND v2)

The only true blue team network defense program!
Cybersecurity now dominates the priorities of every enterprise striving to adapt to a post-COVID world. Forced to go remote, their workers’ identities and devices are the new security perimeter. In fact, cybersecurity for business is now as critical as internet access itself.


Online Booking Coming Soon!

  • Number of Questions: 100
  • Test Duration: 4 Hours
  • Test Format: Multiple Choice
  • Test Delivery: ECC EXAM
  • Exam Prefix 312-38 (ECC EXAM))

Passing Score: In order to maintain the high integrity of our certification exams, EC-Council Exams are provided in multiple forms (I.e. different question banks). Each form is carefully analyzed through beta testing with an appropriate sample group under the purview of a committee of subject matter experts that ensure that each of our exams not only has academic rigor but also has real world applicability. We also have a process to determine the difficulty rating of each question. The individual rating then contributes to an overall cut score for each exam form. To ensure each form has equal assessment standards, cut scores are set on a “per exam form” basis. Depending on which exam form is challenged, cut scores can range from 60% to 85%.

CNDv2 is for those who work in the network administration/cyber security domain in the capacity of Network Administrator/Engineer, Network Security Administrator/Engineer/Analyst, Cyber security Engineer, Security Analyst, Network Defense Technician, Security Operator. CNDv2 is for all cyber security operations roles and anyone who looking to want to build their career in cyber security.

Suggested Course Duration

Days: 5 (9:00 AM – 5:00 PM)

Eligibility Criteria
To be eligible to attempt EC-Council CND certification examination, the candidate has two options:

Attend Official Network Security Training by EC-Council:
If a candidate has completed an official EC-Council training either at an Accredited Training Center, via the iClass platform, or at an approved academic institution, the candidate is eligible to attempt the relevant EC-Council exam without going through the application process.

Attempt the Exam without Official EC-Council Training:
In order to be considered for the EC-Council CNDv2 exam without attending official network security training, the candidate must have at least 2 years of work experience in the Information Security domain and submit an eligibility application form along with a USD 100.00 non-refundable fee.

  • Number of Questions: 100
  • Test Duration: 4 Hours
  • Test Format: Multiple Choice
  • Test Delivery: ECC EXAM
  • Exam Prefix 312-38 (ECC EXAM))

Passing Score: In order to maintain the high integrity of our certification exams, EC-Council Exams are provided in multiple forms (I.e. different question banks). Each form is carefully analyzed through beta testing with an appropriate sample group under the purview of a committee of subject matter experts that ensure that each of our exams not only has academic rigor but also has real world applicability. We also have a process to determine the difficulty rating of each question. The individual rating then contributes to an overall cut score for each exam form. To ensure each form has equal assessment standards, cut scores are set on a “per exam form” basis. Depending on which exam form is challenged, cut scores can range from 60% to 85%.

Virtual Classes
This solution is an asynchronous, self-study environment which delivers EC-Council’s sought-after IT Security hacking training courses in a streaming video format.

Training Partner (In Person)
This solution offers in-person CEH training so that you can get the benefit of collaborating with your peers and gaining real-world skills.

  • Network security management
  • Network security policies and procedures
  • Windows and Linux security administration
  • Mobile and IoT device security
  • Data security techniques
  • Virtualisation technology security
  • Cloud and wireless security
  • Risk assessment tools
  • Basics of first response and forensics
  • Indicators of Compromise, Attack, and Exposures (IoC, IoA, IoE)
  • Threat intelligence capabilities
  • Log management
  • Endpoint security
  • Firewall solutions
  • IDS/IPS technologies
  • Network Authentication,
  • Authorization, Accounting (AAA)

A CONTINUALLY ADAPTIVE COMPREHENSIVE SECURITY STRATEGY

Cyber security is a non-linear process that required a continuous approach to mitigating cyber risks. According to Gartner, traditional “prevent and detect” approaches are inadequate. Developing a continuous Adaptive Security cycle helps organizations stay ahead of cybercriminals, by creating and improving security systems.

Target Audience

  • Defense-In-Depth Security
  • Properly Designed, Implemented and Enforced Security Policies
  • Security Architectures
  • Appropriate Configuration
  • Right Selection of Security Controls

Detect

  • Traffic Monitoring
  • Log Management
  • Log Monitoring
  • Anomalies Detection

Predict

  • Risk and Vulnerability Assessment
  • Attack Surface Analysis
  • Threat Intelligence

Respond

  • Incident Response
  • Forensics Investigation
  • Business Continuity (BC)
  • Disaster Recovery (DR)

Why Is CND In-Demand Globally?

CND v2 is based on the cyber security education framework and work role task analysis presented by the National Initiative of Cybersecurity Education (NICE). The program is also mapped to the Department of Defense (DoD) roles for system/network administrators, as well as, [insert which frameworks here] global work roles and responsibilities.

More than 50% of the CND v2 program is dedicated to practical skills in live ranges via EC-Council labs.

IoT security, previously ignored, has now become an issue of great concern. IoT devices are not primarily designed with security in mind. This leaves serious vulnerabilities while configuring IoT devices in a network. CND v2 introduces candidates to the various challenges that IoT devices pose and the measures required to mitigate them.

Tracking security applications and configurations of remote work environments as workforces span across servers is very difficult. The CND v2 program covers the complete security criterion to protect virtualised environments.

Research firm Gartner predicts that by 2021, 27% of corporate data traffic will bypass perimeter security, and flow directly from mobile and portable devices to the cloud. With the CND v2, you will learn how to ensure that this endpoint remains secure.

While the adoption of cloud computing in organizations has increased, so have the challenges. Learn about the different ways to ensure security across various cloud platforms – AWS, Microsoft Azure Cloud, Google Cloud Platform through the CND v2 program.

Having a proactive approach to security is the new requirement of all organizations. Without threat intelligence, your cyber security posture is simply reactive one. CND v2 helps you take a more effective, proactive approach using threat intelligence.

The key to cyber risk management is in-depth, attack surface analysis. CNDv2 provides how to identify what parts of your organisation need to be reviewed and tested for security vulnerabilities and how to reduce, prevent, and mitigate risks in the network.

TCNDv2 covers latest technologies such as software defined network (SDN) security, network function virtualisation (NFV) security, container security, docker security, and Kubernetes security.