EC-Council • CND
Validates the ability to protect, detect, and respond to network security threats, covering network perimeter protection, endpoint security, firewall and IDS/VPN configuration, network traffic analysis, vulnerability scanning, and incident response.
Questions
562
Duration
240 minutes
Passing Score
70%
Difficulty
AssociateLast Updated
Feb 2026
The EC-Council Certified Network Defender (CND) is a vendor-neutral, skills-based certification that validates a professional's ability to protect, detect, respond to, and predict network security threats. Exam code 312-38, the certification covers a broad range of network defense disciplines including network perimeter protection, endpoint security across Windows, Linux, mobile, and IoT platforms, firewall and IDS/VPN configuration, network traffic and log analysis, vulnerability scanning, and incident response. The program was updated with a v4 exam blueprint effective April 10, 2024, which introduced new topic segmentation and refreshed domain content while maintaining the same exam format and eligibility criteria.
Built on the cybersecurity education framework established by the National Initiative of Cybersecurity Education (NICE) and mapped to Department of Defense (DoD) work roles for system and network administrators, CND emphasizes real-world, job-task-aligned competencies. The certification spans 20 knowledge domains that collectively address the full lifecycle of enterprise network defense — from administrative governance and compliance to cloud security, wireless security, threat intelligence, and business continuity. It holds accreditation from ANSI, GCHQ, and is approved under the DoD 8570/8140 directive.
CND is designed primarily for network and security professionals who are responsible for the day-to-day protection of enterprise network infrastructure. Core target roles include Network Administrators, Security Administrators, Network Security Engineers, Security Analysts, and Network Defense Technicians. The certification is also relevant to IT professionals transitioning into security-focused roles who already have a foundational understanding of networking.
The program is particularly well-suited for individuals working in environments requiring regulatory compliance or DoD-aligned security frameworks. Those seeking to formalize their hands-on network defense skills with a recognized credential, or professionals aiming to qualify for cybersecurity roles within U.S. government contractors and defense agencies, will find the CND especially applicable.
EC-Council does not impose formal academic prerequisites for the CND exam, but candidates must meet one of two eligibility paths. The first is to complete an official EC-Council-authorized CND training course, after which candidates may sit for the exam without further application. The second path allows candidates to attempt the exam without attending official training, provided they can demonstrate at least two years of work experience in the information security domain. Self-study candidates must submit an eligibility application form along with a non-refundable $100 USD processing fee.
In terms of recommended knowledge, candidates should have a solid understanding of TCP/IP networking fundamentals, familiarity with common network devices and protocols, and basic exposure to operating system administration (Windows and Linux). Prior experience with network monitoring tools, firewall configuration, or security operations will provide a meaningful advantage when preparing for the exam.
The CND certification exam (312-38) consists of 100 multiple-choice questions and must be completed within 4 hours (240 minutes). The exam is delivered through the EC-Council ECC Exam Portal and is available at authorized testing centers as well as via online proctoring. The passing score is set at 70%, though EC-Council notes that cut scores can range from 60% to 85% depending on the specific exam form administered, as each form is independently calibrated by subject matter experts to ensure consistent difficulty across versions.
The exam uses multiple exam forms with varied question banks to maintain exam integrity. There are no unscored pilot questions disclosed. Candidates who do not pass may retake the exam immediately for the second attempt using an ECC Exam Center voucher; a 14-day waiting period is enforced starting from the third attempt onward. The current exam is aligned to the CND v4 blueprint, which became effective on April 10, 2024.
The CND certification qualifies holders for network defense and security operations roles in both private industry and government sectors. Common job titles pursued after earning CND include Network Security Engineer, Security Operations Center (SOC) Analyst, Network Administrator (security-focused), and Information Systems Security Officer (ISSO). The certification satisfies DoD 8570.01-M/DoD 8140 requirements for IAT Level II roles, making it directly applicable for personnel seeking positions with U.S. federal agencies or defense contractors. The average salary for a network security engineer in the United States is approximately $125,000 per year.
Compared to alternatives such as CompTIA Security+ (broader but less network-defense-specific) or the Cisco CyberOps Associate (more SOC-focused), CND occupies a distinct niche in hands-on, defender-oriented network security. It complements offensive certifications like CEH and is often pursued alongside or as a precursor to more advanced credentials such as CISSP or CCNP Security. The certification's ANSI accreditation and GCHQ endorsement give it international recognition beyond the U.S. market.
1. A security operations center implements Suricata IDS to replace Snort for improved performance. Management wants to understand the key architectural advantages. Which two capabilities differentiate Suricata from Snort? (Select two!)
Select all that apply2. A security operations center implements SOAR platform to automate incident response workflows. When the NDR solution detects lateral movement indicators, the SOAR platform must automatically create incident tickets, enrich threat intelligence, isolate affected endpoints, and notify the security team. Which SOAR capability enables this automated workflow? (Select one!)
3. A company's authoritative DNS server experiences a DDoS attack where attackers send small DNS queries with spoofed source addresses requesting TXT records, generating responses 40 times larger than the queries. Traffic analysis shows requests for the same records from thousands of IP addresses. What attack type is this and which mitigation strategy is most effective? (Select one!)
4. A penetration tester captures a WPA2-PSK 4-way handshake from a corporate wireless network and plans to perform an offline dictionary attack. The security team wants to understand which specific vulnerability in WPA2-PSK enables this attack method. What makes WPA2-PSK susceptible to offline password cracking after handshake capture? (Select one!)
5. A Security Operations Center receives alerts that an attacker compromised a domain administrator account and is performing DCSync attacks to extract credential hashes from Active Directory. Which Windows Security Event ID logged on domain controllers indicates replication activity associated with DCSync attacks? (Select one!)
All exams included • Cancel anytime