No frills, no fluff
The Cyber Defense Analyst Program is a fast-paced, 12-week program aligned to the NIST workforce role of a Cyber Defense Analyst. Learn the skills you'll need to be a SOC analyst—by doing the job.
Three successful years. Hundreds of satisfied and successful alumni. Plenty of feedback. Plenty of experience.
We're excited to release the new and improved version of our Cyber Defense Analyst (CDA) Live Training Program based on everything we've learned to date.
Our Fall 2023 Cohort has already begun, but you can apply to attend our Winter 2024 Cohort.
No one questions a hacker's ability based on their theoretical knowledge of cyber—it's all about what they can do. So why do we train cyber defenders on theory rather than practice?
Real talk: Certifications based upon theoretical knowledge do not stop breaches and do not reduce risk. Action, skill, and ability do.
The Cyber Defense Analyst Program is a challenging and interactive experience that requires students to first demonstrate and then explain their findings, analysis, and applied remediation steps.
Each module builds upon itself to reinforce your tradecraft and knowledge over 12 weeks. Concepts learned in week one will still be applicable in the final week. Through this cycle, you will build an analytical process, tool mastery, critical thinking, and the ability to assess and validate your findings—in other words, your cyber tradecraft.
Fair warning: This course is NOT a bootcamp that will overwhelm you for 12 weeks. Rather, we'll work with you to develop your abilities for 8 weeks, and then we'll immerse you in a virtual Security Operations Center (SOC) environment for an additional 4 weeks. This is to provide you with realistic, "on-the-job" training and experience to make you career-ready.
Afterward, you'll be ready to demonstrate your knowledge by attempting the CDCP certification over a final period of one week, putting everything to the test.
Please note that before enrolling in our Cyber Defense Analyst Program, you must complete the prerequisite course, Cybersecurity Foundations. Contact us if you found this flag as a student LE-H4KTH3PL4N3T.
Learn how to recognize normal network traffic patterns and distinguish them from unusual or suspicious patterns.
Explore techniques for detecting network anomalies, such as unusual protocol activity, obfuscated payloads, and lateral movement.
Gain hands-on experience in investigating suspicious traffic to understand its origin, destination, and potential impact.
Discover how to filter, parse, and extract relevant information from captured network packets to identify potential security threats.
Develop skills to respond effectively to identified threats and incidents based on network traffic analysis findings.
Learn how to interpret email headers and metadata to trace the origin and path of an email message.
Understand how to analyze suspicious email content, attachments, and hyperlinks to identify potential threats.
Explore techniques to detect email spoofing and tampering attempts through header analysis.
Learn to identify forged or manipulated headers that may indicate malicious intent.
Develop strategies to respond to identified phishing and malicious emails effectively.
Learn how to navigate and interpret the event logs, registry entries, and system files to identify potential security issues or suspicious activities.
Acquire skills to detect abnormal behavior and indicators of compromise (IOCs) on Windows endpoints.
Develop proficiency in analyzing Windows binary executables, such as DLLs (Dynamic Link Libraries) and EXEs (Executables), for signs of malicious behavior.
Understand how to use static and dynamic analysis techniques to identify malicious code, code obfuscation, and potential vulnerabilities.
Practice incident response techniques for mitigating threats on Windows endpoints.
Gain insights into the attacker's mindset, motives, and goals to better understand their modus operandi.
Explore common adversary tactics, techniques, and procedures (TTPs) used to infiltrate Windows enterprise networks, such as phishing, credential theft, lateral movement, and privilege escalation.
Learn how to use network and host-based monitoring tools to identify suspicious behavior, anomalous activities, and indicators of compromise (IOCs).
Develop proficiency in analyzing adversary techniques to determine the extent of the compromise and potential impact on the network.
Practice incident response procedures for effectively mitigating and containing adversary activities in a Windows enterprise network.
Learn various intrusion detection techniques, such as signature-based detection, anomaly-based detection, and behavior-based detection.
Acquire skills to deploy and configure intrusion detection tools.
Develop proficiency in analyzing intrusion detection alerts generated by the IDS/IPS tools.
Learn how to customize detection rules, set up alerting mechanisms, and fine-tune intrusion detection to match the organization's security needs.
Learn how to mitigate and contain intrusions to prevent further damage and data exfiltration.
Learn how to collect, correlate, and analyze logs and events from various sources, including Windows endpoints and network devices.
Develop a methodology building queries and filters to identify anomalous activities, suspicious patterns, and potential indicators of compromise (IOCs) on Windows endpoints.
Acquire skills in utilizing a SIEM to conduct proactive threat hunting engagements.
Learn how to conduct in-depth investigations, trace lateral movement, and perform forensic analysis to understand the nature and impact of incidents.
Acquire hands-on experience in acquiring digital evidence from compromised Windows endpoints while ensuring data integrity and authenticity.
Develop skills in analyzing data artifacts, such as files, registry entries, event logs, and memory dumps, to identify potential evidence of compromise or malicious activity.
Understand the basics of how to reverse-engineer malware and extract valuable indicators of compromise (IOCs) for threat hunting.
Learn how to create comprehensive and well-documented forensic reports detailing the findings, analysis, and conclusions of the investigation.
Work with multiple formats of threat intelligence, including open-source intelligence (OSINT), feeds, and internal data, and how to leverage them for proactive defense.
Acquire skills in collecting and analyzing threat intelligence data to identify emerging threats, malicious actors, and potential vulnerabilities.
Understand how to use threat intelligence platforms and tools to correlate and enrich data for actionable insights.
Learn how to integrate Cyber Threat Intelligence into security operations to enhance threat detection, incident response, and threat hunting capabilities.
Explore the use of threat intelligence in decision-making, incident triage, and risk management.
Develop mastery over the competencies gained in the weeks prior.
The Cyber Defense Analyst Program is a fast-paced, 12-week program aligned to the NIST workforce role of a Cyber Defense Analyst. Learn the skills you'll need to be a SOC analyst—by doing the job.
During the first eight weeks, you'll develop the competencies you'll need to successfully mitigate, contain, and respond to security threats. This is achieved through live classes, real-world scenarios, and practical assessments.
The last four weeks of the class will be spent working in a virtualized Security Operations Center (SOC) environment. You'll have tickets to triage and manage and will report to your SOC manager every week—just like you'd do on the job.
Get job-ready in our dedicated career curriculum that will take you from creating and polishing your resume and social profiles to networking and building your brand. We'll then round it out with real 1-on-1 technical interviews and strategies to succeed.
Buy the course once and own it forever—including future updates and improvements made. Graduates will also have access to our alumni network and will receive extended career support.
Discover the art of outsmarting hackers as you master the craft of dissecting authentic malware samples, forcing them to toil for their entry into your digital domains.
This is what John Hammond had to say about the first iteration of this course.
And guess what? It's only gotten better.
Attending our Cyber Defense Analyst Program will take you from exposure to competency—and finally, to mastery of your craft. Demonstrate your ability and commitment to this field with our courses and milestones of accomplishment.
The Cyber Defense Certified Professional badge is a testament to tradecraft mastery. Badge holders have demonstrated a practical ability to hunt, discover, and defend networks from a multitude of threats, whether they come from inside or outside the network.
Takers who exceed the requirements for CDCP certification are awarded the Gold CDCP status. This badge sets the taker apart by showcasing their mastery of the tradecraft required to conduct sophisticated cyber analysis and investigations.
The Cyber Defense Analyst Program costs $11,000 $5,000.
A note on our new pricing model: We've revamped our Cyber Defense Analyst Program to cater specifically to highly qualified students seeking SOC Tier 1 and 2 positions.
Our students and alumni have expressed overwhelming satisfaction with the program, highlighting that it empowers them to outperform their peers. We ultimately recognized that some of the content in the course would be better suited for separate training courses or more advanced tiers (we're looking at you, malware development and penetration testing). As a result, we took the initiative to better streamline the curriculum.
This improvement allowed us to significantly reduce the cost of the program, making it more accessible to aspiring professionals. Our commitment to delivering top-notch education that specifically focuses on the requirements for SOC Tier 1 and 2 roles remains unwavering, ensuring our students receive the best value for their investment.
The new revised Cyber Defense Analyst Program is just as effective, offering a superior learning experience at a fraction of the previous cost, and demonstrating our dedication to student success and affordability.
We provide TWO VetSec members with a full scholarship to attend our program each cohort. In addition, VetSec members receive a $500 discount on our listed course price.
The simple answer is our program is not a bootcamp. We’ve spent the past three years refining and perfecting the CDA experience based on feedback from current students and alumni.
We've revamped our Cyber Defense Analyst Program to cater specifically to highly qualified students seeking SOC Tier 1 and 2 positions.
Our students and alumni have expressed overwhelming satisfaction with the program, highlighting that it empowers them to outperform their peers. We ultimately recognized that some of the content in the course would be better suited for separate training courses or more advanced tiers (we're looking at you, malware development and penetration testing). As a result, we took the initiative to better streamline the curriculum.
This improvement allowed us to significantly reduce the cost of the program, making it more accessible to aspiring professionals. Our commitment to delivering top-notch education that specifically focuses on the requirements for SOC Tier 1 and 2 roles remains unwavering, ensuring our students receive the best value for their investment.
The new revised Cyber Defense Analyst Program is just as effective, offering a superior learning experience at a fraction of the previous cost, and demonstrating our dedication to student success and affordability.
P.S. If you’re a go-getter who wants additional training, stay tuned: We’ve got more courses on the horizon!
We offer a free Cybersecurity Foundations training pathway to help students embark on their cyber journey. It consists of three fundamentals courses in IT, cybersecurity, and compliance. The course is a requirement for all students who wish to enroll in the Cyber Defense Analyst Program.
You don't need to set up a call or pay to create an account to begin the Cybersecurity Foundations course.
No. Although, we do recommend being comfortable using a computer and completing basic tasks on a computer. Students must complete the pre-requisite Cyber Foundations course before the live instructions which outlines basic, foundational skills you will need to succeed in CDA.
We typically run three cohorts per year each running 12 weeks. During a cohort, students are expected to be present during live virtual instruction which takes place on Monday through Thursday from 7pm-9pm CT. (8pm-10pm ET or 5pm-7pm PT)
Our students get hired in roles such as Cyber Security Analyst, Security Operations Analyst, Cyber Security Engineer, Security Consultant, Digital Forensics & Incident Response Analyst, Compliance Analyst and Penetration Tester.
No, we host all of the virtual computers, network devices, and tools for you. Any common computer that can run a web browser, Zoom, and Discord should be more than sufficient. If you have concerns, please reach out and we can assess if you are good to go!
Considering that the course is held on-demand and live remotely online, there are some key items that will make your experience much smoother.
Yes. We welcome students from wherever they reside. However, there are some caveats that you must take into consideration.
days
hours
minutes
seconds
January 22, 2024
May 13, 2024
Sep 9, 2024