+ All Categories
Home > Documents > CND Exam Blueprint v1 - EC-Council Blueprint v1.pdf · CND Exam Blueprint 04 10. Understanding...

CND Exam Blueprint v1 - EC-Council Blueprint v1.pdf · CND Exam Blueprint 04 10. Understanding...

Date post: 12-Sep-2018
Category:
Upload: phungdang
View: 234 times
Download: 2 times
Share this document with a friend
8
EC-Council CND Exam Blueprint v1 Certified D Network Defender N C
Transcript
Page 1: CND Exam Blueprint v1 - EC-Council Blueprint v1.pdf · CND Exam Blueprint 04 10. Understanding security requirements for hardening of switches 11. Understanding data security at rest,

CND Exam Blueprint 1

EC-Council

CND Exam Blueprint v1

CertifiedD

Network Defender

NC

Page 2: CND Exam Blueprint v1 - EC-Council Blueprint v1.pdf · CND Exam Blueprint 04 10. Understanding security requirements for hardening of switches 11. Understanding data security at rest,

CND Exam Blueprint 02

CND Phases CND Domains CND Objectives Weight Number of Questions

Introduction

Module 01 Computer Network and Defense Fundamentals

01. Understanding computer network02. Describing OSI and TCP/IP network Models 03. Comparing OSI and TCP/IP network Models 04. Understanding different types of networks 05. Describing various network topologies 06. Understanding various network

components 07. Explaining various protocols in TCP/IP

protocol stack 08. Explaining IP addressing concept 09. Understanding Computer Network

Defense(CND) 10. Describing fundamental CND attributes 11. Describing CND elements 12. Describing CND process and Approaches

5% 5

Module 02 Network Security Threats, Vulnerabilities, and Attacks

01. Understanding threat, attack, and vulnerability

02. Discussing network security concerns03. Discussing the reasons behind network

security concerns04. Understanding the effect of network

security breach on business continuity05. Understanding different types of network

threats06. Understanding different types of network

security vulnerabilities07. Understanding different types of network

attacks08. Describing various network attacks

5% 5

Module 03 Network Security Controls, Protocols, and Devices

01. Understanding fundamental elements of network security

02. Explaining network access control mechanism

03. Understanding different types of access controls

04. Explaining network Authentication, Authorization and Auditing (AAA) mechanism

05. Explaining network data encryption mechanism

06. Describing Public Key Infrastructure (PKI) 07. Describing various network security

protocols 08. Describing various network security

devices

8% 8

Page 3: CND Exam Blueprint v1 - EC-Council Blueprint v1.pdf · CND Exam Blueprint 04 10. Understanding security requirements for hardening of switches 11. Understanding data security at rest,

CND Exam Blueprint 03

Protection

Module 04 Network Security Policy Design and Implementation

01. Understanding security policy02. Discussing the need of security policies03. Describing the hierarchy of security policy04. Describing the characteristics of a good

security policy05. Describing typical content of security

policy06. Understanding policy statement07. Describing steps for creating and

implementing security policy08. Understanding the designing of security

policy09. Understanding the implementation of

security policy10. Describing various types of security policy11. Discussing the designing of various

security policies12. Discussing various information security

related standards, laws and acts

6% 6

Module 05 Physical Security

01. Understanding physical security 02. Discussing the need of physical security 03. Discussing the factors affecting physical

security 04. Describing various physical security

controls 05. Understanding choosing Fire Fighting

Systems 06. Describing various access control

authentication techniques 07. Understanding workplace security 08. Understanding personnel security 09. Describing Environmental Controls 10. Understanding the importance of physical

security awareness and training

6% 6

Module 06Host Security

01. Understanding host security02. Understanding need of securing individual

hosts03. Understanding threats specific to hosts04. Identifying paths to host threats05. Understanding the purpose of host before

assessment06. Describing host security baselining07. Describing OS security baselining08. Understanding and describing security

requirements for different types of servers09. Understanding security requirements for

hardening of routers

7% 7

Page 4: CND Exam Blueprint v1 - EC-Council Blueprint v1.pdf · CND Exam Blueprint 04 10. Understanding security requirements for hardening of switches 11. Understanding data security at rest,

CND Exam Blueprint 04

10. Understanding security requirements for hardening of switches

11. Understanding data security at rest, motion and use

12. Understanding virtualization security

Module 07 Secure Firewall Configuration and Management

01. Understanding firewalls 02. Understanding firewall security concerns 03. Describing various firewall technologies 04. Describing firewall topologies 05. Understanding the appropriate selection

of firewall topologies 06. Understanding the designing and

configuring firewall ruleset 07. Discussing the Implementation of firewall

policies08. Explaining the deployment and

implementation of firewall09. Discussing the factors to considers before

purchasing any firewall solution 10. Describing the configuring, testing and

deploying of firewalls 11. Describing the managing, maintaining,

administrating firewall implementation 12. Understanding firewall logging 13. Understanding the measures for avoiding

firewall evasion 14. Understanding firewall security best

practices

8% 8

Module 08 Secure IDS Configuration and Management

01. Understanding different types of intrusions and their indications

02. Understanding IDPS03. Understanding the importance of

implementing IDPS04. Describing role of IDPS in network defense05. Describing functions, components, and

working of IDPS06. Explaining various types of IDS

implementation07. Describing staged deployment of NIDS

and HIDS08. Describing fine-tuning of IDS by

minimizing false positive and false negative rate

09. Discussing characteristics of good IDS implementation

10. Discussing common IDS implementation mistakes and their remedies

11. Explaining various types of IPS implementation

8% 8

Page 5: CND Exam Blueprint v1 - EC-Council Blueprint v1.pdf · CND Exam Blueprint 04 10. Understanding security requirements for hardening of switches 11. Understanding data security at rest,

CND Exam Blueprint 05

12. Discussing requirements for selectingappropriate IDSP product

13. Discussing the technologiescomplementing IDS functionality

Module 09 Secure VPN Configuration and Management

01. Understanding Virtual Private Network(VPN) and its working

02. Understanding the importance ofestablishing VPN

03. Describing various VPN components04. Describing implementation of VPN

concentrators and its functions05. Explaining different types of VPN

technologies06. Discussing components for selecting

appropriate VPN technology 07. Explaining core functions of VPN08. Explaining various topologies for

implementation of VPN 09. Discussing various VPN security concerns10. Discussing various security implications for

to ensure VPN security and performance

5% 6

Module 10 Wireless Network Defense

01. Understanding wireless network02. Discussing various wireless standards03. Describing various wireless network

topologies04. Describing possible use of wireless

networks05. Explaining various wireless network

components06. Explaining wireless encryption (WEP,

WPA,WPA2) technologies07. Describing various authentication

methods for wireless networks08. Discussing various types of threats on

wireless networks09. Discussing the creation of inventory for

wireless network components10. Discussing the appropriate placement of

wireless AP11. Discussing the appropriate placement of

wireless antenna12. Discussing the monitoring of wireless

network traffic13. Discussing the detection and locating of

rogue access points14. Discussing the prevention of wireless

network from RF interference15. Describing various security implications for

wireless network

6% 6

Page 6: CND Exam Blueprint v1 - EC-Council Blueprint v1.pdf · CND Exam Blueprint 04 10. Understanding security requirements for hardening of switches 11. Understanding data security at rest,

CND Exam Blueprint 06

Analysis and Detection

Module 11 Network Traffic Monitoring and Analysis

01. Understanding network traffic monitoring 02. Understanding the importance of network

traffic monitoring 03. Discussing techniques used for network

monitoring and analysis 04. Discussing the appropriate position for

network monitoring 05. Discussing the connection of network

monitoring system with managed switch 06. Understanding network traffic signatures 07. Discussing the baselining for normal traffic 08. Disusing the various categories of

suspicious traffic signatures 09. Discussing the various techniques for

attack signature analysis 10. Understanding Wireshark components,

working and features 11. Demonstrating the use of various

Wireshark filters 12. Demonstrating the monitoring LAN traffic

against policy violation 13. Demonstrating the security monitoring of

network traffic 14. Demonstrating the detection of various

attacks using Wireshark15. Discussing network bandwidth monitoring

and performance improvement

9% 9

Module 12 Network Risk and Vulnerability Management

01. Understanding risk and risk management02. Discussing the key roles and

responsibilities in risk management03. Understanding Key Risk Indicators (KRI) in

risk management04. Explaining phase involves in risk

management05. Understanding enterprise network risk

management06. Describing various risk management

frameworks07. Discussing best practices for effective

implementation of risk management08. Understanding vulnerability management09. Explaining various phases involve in

vulnerability management10. Understanding vulnerability assessment

and its importance11. Discussing requirements for effective

network vulnerability assessment12. Discussing internal and external

vulnerability assessment13. Discussing steps for effective external

vulnerability assessment

9% 9

Page 7: CND Exam Blueprint v1 - EC-Council Blueprint v1.pdf · CND Exam Blueprint 04 10. Understanding security requirements for hardening of switches 11. Understanding data security at rest,

CND Exam Blueprint 07

14. Describing various phases involve invulnerability assessment

15. Discussing the selection of appropriatevulnerability assessment tool

16. Discussing best practices and precautionsfor deploying vulnerability assessment tool

17. Describing vulnerability reporting,mitigation, remediation and verification

Response

Module 13Data Backup and Recovery

01. Understanding data backup02. Describing the data backup plan03. Describing the identification of data to

backup04. Determining the appropriate backup

medium for data backup05. Understanding RAID backup technology

and its advantages06. Describing RAID architecture07. Describing various RAID levels and their

use08. Discussing the selection of appropriate

RAID level09. Understanding Storage Area Network

(SAN) backup technology and itsadvantages

10. Discussing the best practices of using SAN11. Understanding Network Attached

Storage (NAS) backup technology and itsadvantages

12. Describing various types of NASimplementation

13. Determining the appropriate backupmethod

14. Discussing the selection of appropriatelocation for backup

15. Understanding full, differential, andincremental backup types

16. Discussing the selection of appropriatebackup types

17. Determining the appropriate BackupSolution

18. Discussing recovery drill test on backupdata

19. Understanding data recovery20. Discussing data recovery tools for various

backup technology

9% 9

Module 14 Network Incident Response and Management

01. Understanding Incident Handling andResponse (IH&R)

8% 8

Page 8: CND Exam Blueprint v1 - EC-Council Blueprint v1.pdf · CND Exam Blueprint 04 10. Understanding security requirements for hardening of switches 11. Understanding data security at rest,

CND Exam Blueprint 08

02. Discussing the roles andresponsibilities of Incident ResponseTeam (IRT)

03. Describing role of first responder04. Describing first response activities for

network administrators05. Describing Incident Handling and

Response (IH&R) process06. Understanding forensic investigation07. Discussing the people involved in

forensics investigation08. Describing forensics investigation

methodology


Recommended