Contact Us
Adversaries are always learning, adapting, and deploying new techniques to undermine your network and turn it against itself and the organization. Do you have what it takes to be a Cyber Defense Analyst?
Register Now
''...the best instructor bringing real world experience to your education.  Highly recommend someone looking to work in a SOC take his class.''
Source: Linkedin
''...world-class cybersecurity educator with a diverse skillset and unique ability to translate security concepts into real-world scenarios.''
Source: Linkedin
''For those of you that haven't met Greg yet, he was my Cyber Security bootcamp instructor last year.  Very knowledgeable, you will learn a lot from him!! Highly recommend!''
Source: Linkedin
''I've taken Greg's earlier cyber #threathunting course with my team of #datascientists.... we still talk about it and the lessons learned through it!! Yes, it's that good. Greg Ake and his hands-on approach to this is just what the market needs!!''
Source: Linkedin
Experienced Instruction
The creators and instructors of the Cyber Defense Analyst course come with over 20 combined years of experience as intelligence analysts, offensive and defensive cyber operators and software developers within the National Security Agency. Learn from our unique experience and perspective on cyber trends and how to assess, secure, and defend an enterprise network.
Beyond Hands-On
It isn't enough to just get hands-on lab experience. Take on the role of a Cyber Defense Analyst within the Security Operations Center. Gain insight by solving cyber attack and defense scenarios in a virtual enterprise network.  You will administer, analyze, detect and triage a wide array of computers and networks within the course gaining practical and applicable cyber defense knowledge and experience.
Standards Matter
The Cyber Defense Analyst course curriculum utilizes and exceeds the knowledge, skill, ability and task objectives outlined by the U.S. National Institute of Standards and Technology (NIST) SP 800-181 for cyber education, training, and workforce development. This provides students with an alignment between the experience and skills gained in this course to the defined expectations and roles defined by NIST.
Foundry™
A modern and seamless course experience where content, labs, virtual machines and networks are accessible regardless of location and student computer used. Review course material, watch lecture videos, master labs and defend the enterprise  right in your browser.
CDA Curriculum Topics
1
Cybersecurity
Gain a foundation in the terminology, roles, compliance frameworks, adversaries, attacks, and security operations that comprise the field of cybersecurity.
2
Networking
Dive into network communications, protocols, services and devices to develop the necessary skills for triage, analysis and network forensics.
3
Windows Enterprise Networks
Learn about the unique services, protocols, and systems that make up a Windows enterprise network. Manage, configure, harden roles, policies and services against network attack.
4
Advanced Windows OS
Obtain a deep operational knowledge of the Windows OS to include the kernel and user space, Windows Management Instrumentation (WMI), exploits, malware, and conduct incident triage analysis.
5
Security Operations
Identify the roles, expectations and processes of security operations and through the use of Security Incident and Event Management (SIEM), Intrusion detection/prevention, Endpoint Detection and Response, Antivirus, security alert triage and analysis.
6
Cyber Threat Intelligence
Utilize the intelligence analysis process used by the U.S. Intelligence Community to identify, analyze, refine, and report indicators and behaviors to support cyber intelligence and defense activities.
7
Linux OS
A trusted, open source and accessible OS that is used for both defense and offensive cyber operations. Gain familiarity with the operating system and exposure with the popular Kali Linux distribution.
8
Adversary Tactics
Learn and apply defensive measures through the hands on application of adversary tactics. Abuse kerberos, NTLM, move laterally to compromise additional vulnerable machines and attack and own the domain controller. Breach the network as an adversary would from patient zero to domain administrator access.
9
Threat Hunting
Utilize the hypothesis driven process to hunt for adversaries that have evaded your preventative security technologies. Learn how to scope, analyze, discover, and deter malicious adversary tactics and behaviors.
10
Network and Computer Forensics
Utilize well-defined approaches to gathering and analyzing network and computer-based evidence to support incident response investigations and legal cases.
11
Memory and Malware Analysis
Extract artifacts from memory to support static, dynamic, and reverse engineering analysis of malicious files.
12
Cloud Security
Analyze, assess and remediate misconfigured cloud accounts, systems, roles, and services to include potential data leak of private and proprietary data.
13
Cyber Defense Certified Professional Capstone
Take on the role of a Cyber Defense Analyst to respond, analyze, detect, triage, and hunt for known and unknown adversaries in your network. Do you have what it takes to defeat the hackers in your network?
Cyber Defense Certified Professional™ (CDCP)
The CDCP is a practical application of the knowledge, tools, techniques, and procedures acquired through the CDA course. The CDCP is filling a gap in cyber defense certification for both the hard and soft skills that are required and in high demand within the cyber community.

This is accomplished through a battery of real-world security operations scenarios that students must overcome and articulate in a detailed report that includes the appropriate executive summary, findings, recommendations and remediation steps along with applicable evidence. A holder of the CDCP has demonstrated the knowledge, skill, and practical application to work within a security operations team.
Course Culture and Expectations
This course was designed to provide a practical and real-world experience for students. The objective is to empower students with realistic and applicable skills that can be applied on the job. Do not take the challenge lightly.
  • Students will access our learning management systems, Foundry™, to review course material, consume lecture videos and complete foundational labs. In class, students will work with instructors to overcome complex scenario based capstone challenges that reinforce core concepts and curriculum topics.
  • Students are expected to apply core concepts toward solving and overcoming challenges.
  • This course is hardcore. Success is acquired through pain and struggle. Prepare yourself.
Who Should Attend
  • Those interested in getting into the cybersecurity field.
  • IT personnel who need to know how to defend networks from attack.
  • Managers and operations personnel who require a deeper technical understanding of cyber defense beyond simple terms and concepts.
CDA Course Details
  • Tuition: $8,000
  • Duration: 13 Weeks
  • Delivery: Live Online
  • Schedule: Mon-Thur (7-9pm CST)
  • Students Receive: 
    - Certificate of Course Completion
    - CDCP Certification Attempt

    - Lecture Slides
    - Lab Guides
    - Course Notes
Course Schedule
Summer 2020
July 6, 2020
-
October 1, 2020
Winter 2020
October 12, 2020
-
January 14, 2021
Spring 2021
January 25, 2021
-
April 8, 2021
Course Financing Options
  • We've partnered with Climb Credit to provide long term financing options for the CDA boot camp. Please visit https://climbcredit.com/leveleffect to learn more.
  • Receive a $500 discount when paying in full prior to class start date.
  • Payment Plan available.
  • Active duty military and Veteran discounts available.
Still not sure?
Click below to schedule a meeting  with someone at Level Effect about the course, expectations, or if the program is the right fit for you.
Schedule a Call
CDA Registration
© 2020 by LevelEffect.com
Privacy
Terms
Follow Us