Contact Us
Adversaries are always learning, adapting, and deploying new techniques to undermine your network and turn it against itself and the organization. Do you have what it takes to be a Cyber Defense Analyst?
Register Now
Experienced Instruction
The creators and instructors of the Cyber Defense Analyst course come with over 20 combined years of experience as intelligence analysts, offensive and defensive cyber operators and software developers within the National Security Agency. Learn from our unique experience and perspective on cyber trends and how to assess, secure, and defend your network.
Beyond Hands-On
It isn't enough to just get hands-on lab experience. Take on the role of a Cyber Defense Analyst within the Security Operations Center. Gain insight by solving cyber attack and defense scenarios in a virtual enterprise network.  You will administer, analyze, detect and triage a wide array of computers and networks within the course gaining practical and applicable cyber defense knowledge and experience.
Standards Matter
The Cyber Defense Analyst course curriculum utilizes and exceeds the knowledge, skill, ability and task objectives outlined by the U.S. National Institute of Standards and Technology (NIST) SP 800-181 for cyber education, training, and workforce development. This provides students with an alignment between the experience and skills gained in this course to the defined expectations and roles defined by NIST.
Foundry™
A modern and seamless course experience where content, labs, virtual machines and networks are accessible regardless of location and student computer used. Review course material, watch lecture videos, master labs and defend the enterprise  right in your browser.
CDA Curriculum Topics
1
Cybersecurity
Gain a foundation in the terminology, roles, compliance frameworks, adversaries, attacks, and security operations that comprise the field of cybersecurity.
2
Networking
Dive into network communications, protocols, services and devices to develop the necessary skills for triage, analysis and network forensics.
3
Windows Enterprise Networks
Learn about the unique services, protocols, and systems that make up a Windows enterprise network. Manage, configure, harden roles, policies and services against network attack.
4
Advanced Windows OS
Obtain a deep operational knowledge of the Windows OS to include the kernel and user space, Windows Management Instrumentation (WMI), exploits, malware, and conduct incident triage analysis.
5
Security Operations
Identify the roles, expectations and processes of security operations and through the use of Security Incident and Event Management (SIEM), Intrusion detection/prevention, Endpoint Detection and Response, Antivirus, security alert triage and analysis.
6
Cyber Threat Intelligence
Utilize the intelligence analysis process used by the U.S. Intelligence Community to identify, analyze, refine, and report indicators and behaviors to support cyber intelligence and defense activities.
7
Linux OS
A trusted, open source and accessible OS that is used for both defense and offensive cyber operations. Gain familiarity with the operating system and exposure with the popular Kali Linux distribution.
8
Adversary Tactics
Learn and apply defensive measures through the hands on application of adversary tactics. Abuse kerberos, NTLM, move laterally to compromise additional vulnerable machines and attack and own the domain controller. Breach the network as an adversary would from patient zero to domain administrator access.
9
Threat Hunting
Utilize the hypothesis driven process to hunt for adversaries that have evaded your preventative security technologies. Learn how to scope, analyze, discover, and deter malicious adversary tactics and behaviors.
10
Network and Computer Forensics
Utilize well-defined approaches to gathering and analyzing network and computer-based evidence to support incident response investigations and legal cases.
11
Memory and Malware Analysis
Extract artifacts from memory to support static, dynamic, and reverse engineering analysis of malicious files.
12
Cloud Security
Analyze, assess and remediate misconfigured cloud accounts, systems, roles, and services to include potential data leak of private and proprietary data.
13
Cyber Defense Certified Professional Capstone
Take on the role of a Cyber Defense Analyst to respond, analyze, detect, triage, and hunt for known and unknown adversaries in your network. Do you have what it takes to defeat the hackers in your network?
Cyber Defense Certified Professional™ (CDCP)
The CDCP is a practical application of the knowledge, tools, techniques, and procedures acquired through the CDA course. The CDCP is filling a gap in cyber defense certification for both the hard and soft skills that are required and in high demand within the cyber community.

This is accomplished through a battery of real-world security operations scenarios that students must overcome and articulate in a detailed report that includes the appropriate executive summary, findings, recommendations and remediation steps along with applicable evidence. A holder of the CDCP has demonstrated the knowledge, skill, and practical application to work within a security operations team.
Course Culture and Expectations
This course was designed to provide a practical and real-world experience for students. The objective is to empower students with realistic and applicable skills that can be applied on the job. Do not take the challenge lightly.
  • Students will access our learning management systems, Foundry™, to review course material, consume lecture videos and complete foundational labs. In class, students will work with instructors to overcome complex scenario based capstone challenges that reinforce core concepts and curriculum topics.
  • Students are expected to apply core concepts toward solving and overcoming challenges.
  • This course is hardcore. Success is acquired through pain and struggle. Prepare yourself.
Who Should Attend
  • Those interested in getting into the cybersecurity field.
  • IT personnel who need to know how to defend networks from attack.
  • Managers and operations personnel who require a deeper technical understanding of cyber defense beyond simple terms and concepts.
CDA Course Details
  • Course Cost: $8,000 USD
  • Duration: 13 Weeks
  • Delivery: Live Online
  • Schedule: Mon-Thur (7-9pm CST)
  • Certificate of Completion
  • Students Receive: Course slides, labs, personal notes
Course Schedule
Summer 2020
July 6, 2020
-
October 1, 2020
Winter 2020
October 12, 2020
-
January 14, 2021
Spring 2021
January 25, 2021
-
April 8, 2021
Still not sure?
Contact us if you would like to speak with someone about the course, expectations, or if the program is the right fit for you.
Contact Us
CDA Registration
© 2020 by LevelEffect.com
Privacy
Terms
Follow Us