<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=325921436538399&amp;ev=PageView&amp;noscript=1">
Skip to the main content.

Create an account on our custom learning platform, Foundry™, to access our free and premium content.

Create Free Account

 

New call-to-action

Cyber Defense Certified Professional (CDCP)

Fully Practical. No Multiple Choice. 

Get on the Waitlist

The Why Behind this Certification

Theory only gets you so far.

A certification that tests solely on practical ability is the truest measure of real-world performance, providing a clear assessment of readiness and capability for those defending against active threats.

This certification ensures when you face real threats, you will have the experience and skill to respond effectively at a SOC Tier 1 to 2 Analyst level.

 

Description

The CDCP is a practical application of the knowledge, tools, techniques, and procedures acquired through the Cyber Defense Analyst Program. This is accomplished through a battery of real-world security operations scenarios that students must overcome and articulate in a detailed report that includes the appropriate executive summary, findings, recommendations, and remediation steps along with applicable evidence. 

You will have one week to complete the exam objectives and submit your report for manual Instructor review. There is NO multiple choice in this exam.

A holder of the CDCP has demonstrated the knowledge, skill, and practical application to work within a security operations team.

cdcp

Cost

Single attempt: $249

Two attempts: $349

Note that the Cyber Defense Analyst (CDA) Program comes with two attempts and is on a special launch rate of $499 until January 2025.

100% Hands-On Proof of Skill Through a Trial by Fire

The CDCP is a practical assessment of the taker's skills and ability. Those attempting the CDCP are challenged to not only solve the problems presented, but they must also provide comprehensive reports, evidence, and remediation steps to resolve them.

Real and Complex Scenarios Seen in the Wild

Modeled after real-scenarios observed across thousands of customer networks and security operations teams. Hunt, Discover, and Defend within the network as it's under attack from a myriad of external and internal threats.

Graded by Former NSA and Senior Industry Professionals

Each report is reviewed and assessed by multiple  instructors of the program, and then discussed internally by all of them to ensure everything is considered before delivering you your results.

Challenges Required for CDCP

Cyber Threat Intelligence

Develop and present strategic and tactical intelligence reports to support an active breach and gain an advantage on how to hunt and eradicate the threat with targeted research.

Network Traffic Analysis

Assess the severity and impact of the suspected malware observed in the network through the application of traffic analysis and forensic recovery of key indicators of compromise. 

Malicious Email Analysis

Review MALSPAM and assess the type, scope, and impact of the campaign targeted at the organization. Identify the adversary tools and infrastructure, and devise remediation and preventative controls.

Log Analysis

Hunt through network and endpoint logs to identify what an insider threat did on their way out the door. Build a timeline of events and use your root-cause-analysis skills to remediate and lock them out for good.

Compromised Host

Find the malware lurking within and the means in which it maintains persistence. Gather evidence from running apps, memory, network, and the disk to support the containment and remediation of the discovered malware.

Malware Analysis

Utilize static and dynamic malware analysis techniques to uncover unique indicators, behaviors, and capabilities of the identified sample. Create containment and remediation steps to increase the adversaries' cost of access to your network.

 

Frequently Asked Questions