Courses
Certified Cyber Defender Practitioner (CCDP)
The Certified Cyber Defender Practitioner 3 days of hands-on certification training prepares an organization to create a complete end-to-end solution for proactively monitor prevent, detecting and mitigating threats as they arise in real-time. This fast-paced and thorough hands-on training will lead the IT-Pro through a well-rounded experience where he/she will be able to set up an deploy state-of-the-art open source and for-purchase analysis tools, intrusion detection tools, Syslog servers, SIEMs along with integrating them for the entire company to find and, in many cases prevent today's exploits.
Upcoming Training Dates
23 - 25 September 2024
9 - 11 December 2024
*This training schedule is subject to change
Pass the 2-hour exam consisting of 50 Online Multiple Choice Questions with the score of 70% to earn this certification
One of the most industry validated digital skills certification in Asia. Course and exams is taken by the industries / academia / governments from 26 countries in Asia via 30+ Authorised Training Partners (ATP) and 50+ Authorised Academy Partners (AAP).
“Vendor-neutral” certifications refer to any certifications that are not directly associated with specific IT vendors. These certifications tend to develop a knowledge and skill base that is universally applicable and individual with skills that are more conceptual, setting you up to work with a greater range of products / tools.
Inquiry Form
A Cyber Defender practitioner, often referred to as a Cyber Defense Analyst, plays a crucial role in protecting organizations from cyber threats. These professionals use various cyber defense tools, such as intrusion detection systems (IDS) and firewalls, to monitor and analyze network traffic and system activities. Their primary responsibilities include detecting, identifying, and mitigating potential cyber threats and instrusions.
Training Module
Module 1: Cyber Defense Principles
- Blue Team vs Read Team vs Purple Team
- Defensive network architecture concepts
- Security operation center concepts
- Identifying vulnerabilities
- Detecting threats
- Implementing security measures
Module 2: Digital Forensics & Incident Response
- Creating Digital Forensic Lab
- Digital Forensic & Investigation tools
- Analyzing packets
- Capture & analyze network activity
- Capture & analyze file
Module 3: Practical Malware Analysis
- msfvenom analysis
- ransomware analysis
- Process monitor configuration
- Sandbox configuration
- Hybrid analysis
Module 4: Traffic Analysis
- Anylizer Tools
- Intercepting traffic
- Website Defacement traffic analysis
- IDS Alerts traffic analysis
- Find the backdoor
- Traffic Analysis with AI (TAAI)
Module 5: Cyber Defense within the Organization
- Deploy & Configuring NGFW
- Deploy & Configuring SIEM
- Deploy & Configuring IPS/IDS
- Cloud Defense System
Module 6: Defeating the Red Team
- System Hardening
- Mitigation
- Deploy & Configuring Defensive System
- Artificial Intelligence Uses in Blue Team Security
Customer Feedback
Our works is featured on