<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=325921436538399&amp;ev=PageView&amp;noscript=1">
Skip to the main content.

Create an account on our custom learning platform, Foundry™, to access our free and premium content.

Create Free Account


New call-to-action

Set Yourself Apart

Theory Only Gets Us So Far. Demonstrate Your Ability By Solving Real Challenges Faced By Businesses Today.

Beyond Theory

The CDCP is a practical application of the knowledge, tools, techniques, and procedures acquired through the Cyber Defense Analyst Program. This is accomplished through a battery of real-world security operations scenarios that students must overcome and articulate in a detailed report that includes the appropriate executive summary, findings, recommendations, and remediation steps along with applicable evidence. A holder of the CDCP has demonstrated the knowledge, skill, and practical application to work within a security operations team.


100% Hands-On Proof of Skill Through a Trial by Fire

The CDCP is a practical assessment of the taker's skills and ability. Those attempting the CDCP are challenged to not only solve the problems presented, but they must also provide comprehensive reports, evidence, and remediation steps to resolve them.

Real and Complex Scenarios Seen in the Wild

Modeled after real-scenarios observed across thousands of customer networks and security operations teams. Hunt, Discover, and Defend within the network as it's under attack from a myriad of external and internal threats.

Graded by Cyber Pros with Feedback and Guidance for Every Taker

Each report is reviewed and assessed by instructors of the program who provide feedback designed to ensure takers know where they can improve regardless of the attempt outcome. 

Cyber Threat Intelligence

Develop and present strategic and tactical intelligence reports to support an active breach and gain an advantage on how to hunt and eradicate the threat with targeted research.

Network Traffic Analysis

Assess the severity and impact of the suspected malware observed in the network through the application of traffic analysis and forensic recovery of key indicators of compromise. 

Malicious Email Analysis

Review MALSPAM and assess the type, scope, and impact of the campaign targeted at the organization. Identify the adversary tools and infrastructure, and devise remediation and preventative controls.

Log Analysis

Hunt through network and endpoint logs to identify what an insider threat did on their way out the door. Build a timeline of events and use your root-cause-analysis skills to remediate and lock them out for good.

Compromised Host

Find the malware lurking within and the means in which it maintains persistence. Gather evidence from running apps, memory, network, and the disk to support the containment and remediation of the discovered malware.

Malware Analysis

Utilize static and dynamic malware analysis techniques to uncover unique indicators, behaviors, and capabilities of the identified sample. Create containment and remediation steps to increase the adversaries' cost of access to your network.


Frequently Asked Questions