• 0800 677 1232
  • info@robustittraining.com
  • Facebook:
  • LinkedIn:
  • Youtube:

Certified Network Defender

EXAM CODES 312-38

About CND

The Certified Network Defender (CND) certification program focuses on creating Network Administrators who are trained on protecting, detecting and responding to the threats on the network. Network administrators are usually familiar with network components, traffic, performance and utilization, network topology, location of each system, security policy, etc.

A CND will get the fundamental understanding of the true construct of data transfer, network technologies, software technologies so that the they understand how networks operate, understand what software is automating and how to analyze the subject material. In addition, network defense fundamentals, the application of network security controls, protocols, perimeter appliances, secure IDS, VPN and firewall configuration, intricacies of network traffic signature, analysis and vulnerability scanning are also covered which will help the Network Administrator design greater network security policies and successful incident response plans.

The purpose of the CND credential is to:

  • Validate the skills that will help the Network Administrators foster resiliency and continuity of operations during attacks.

Benefits of training with us

  • Intuitive and rewarding online training resources

  • 24/7 access to our unique course materials

  • Custom built practical tasks and challenges

  • Official mock examinations to fully prepare you for any final exams

  • Career advice and CV support once training has been completed

  • Full printable course materials, allowing you take your learning offline at your own convenience

Enquiry Form

Request More Information

Exam Description Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and responsibilities and the Department of Defense (DoD) job roles for system/network administrators. The course is designed and developed after extensive market research and surveys.
Exam Codes 312-38
Passing Score In order to maintain the high integrity of our certifications exams, EC-Council Exams are provided in multiple forms (I.e. different question banks). Each form is carefully analyzed through beta testing with an appropriate sample group under the purview of a committee of subject matter experts that ensure that each of our exams not only has academic rigor but also has "real world" applicability. We also have a process to determine the difficulty rating of each question. The individual rating then contributes to an overall "Cut Score" for each exam form. To ensure each form has equal assessment standards, cut scores are set on a "per exam form" basis. Depending on which exam form is challenged, cut scores can range from 60% to 85%.
  • Computer Network and Defense Fundamentals.
  • Network Security Threats, Vulnerabilities, and Attacks.
  • Network Security Controls, Protocols, and Devices.
  • Network Security Policy Design and Implementation.
  • Physical Security.
  • Host Security.
  • Secure Firewall Configuration and Management.
  • Secure IDS Configuration and Management.
  • Secure VPN Configuration and Management.
  • Wireless Network Defense.
  • Network Traffic Monitoring and Analysis.
  • Network Risk and Vulnerability Management.
  • Data Backup and Recovery.
  • Network Incident Response and Management.
  • Network Administrators

  • Network security Administrators

  • Network Security Engineer

  • Network Defense Technicians

  • CND Analyst

  • Security Analyst

  • Security Operator

Courses you might also be interested in

Certified Ethical Hacker


A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful...

Find out more

Certified Hacking Forensic Investigator


Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer crime in today's cyber...

Find out more

Our training is trusted and accredited
Brand 1
Brand 1
Brand 1
Brand 1
Brand 1
Brand 1
Brand 1
Brand 1
Brand 1
Brand 1
Brand 1