Certified Cyber Defender Associate (CCDA)
Build the skills necessary to defend the network against new age cyber-attacks.


Just as every military and police force needs a firing range to hone weapons skills and battle tactics,
every Next-Gen Cyber Defender needs access to a Cyber Range.
Course details, modules & more
Only with an Internet-scale, operationally-relevant, and ever-current Cyber Range organizations can produce the empirically valid cyber war-gaming scenarios necessary to develop IT staff skills and
instincts for defensive action.
Similarly, the only way to understand the resiliency of IT infrastructures is to assault every element within them using the high-stress, real-world conditions created in the controlled environment of a Cyber Range.
Our cyber security training program, Certified Cyber Defender Associate (CCDA) helps security teams build the skills necessary to defend their network against new age cyber-attacks.
Participants of this program will develop a deep understanding and advanced skills to formulate defense strategies against sophisticated cyber attacks. With our cyber range program, your cyber security personnel can build the capabilities and competencies necessary to secure your organization and critical assets.
This training program require participants to formulate defense responses using next-generation firewalls, intrusion prevention systems, URL filters, anti-spyware systems, anti-virus systems, anti-DDOS systems, data filters and file blocking systems and advanced application based protection systems.
Participants will also be required to correlate information from the sources mentioned and collaborate with other team members to further develop a comprehensive cyber defense strategy.
This programme is meant for anyone who is looking to up skill their level of security operations proficiency, multi-skill themselves in cyber security or to take on cyber-security related job roles.
Cyber Security Professionals
System/Network Administrators
Information security officers / ISMS manager
ICTSOs / CIOs / CISOs / CSOs / CTOs
Security auditors, & governance and compliance officers
Learn to formulate defense responses using existing cyber security technology
Gain advanced skills to build defense strategies against cyber-attacks
Develop the ability to correlate cyber security related information from multiple sources
Boost earning capability
Improve credibility in terms of Information Security qualifications and experience
DAY 1
Current Threat Landscape
Modern Day Threats
CIS Critical Security Controls
Cyber Range Malaysia
Confidentiality, Availability & Integrity
Information Security Management Framework
Blue Team & Red Team
Hacking Phase 1 – Reconnaissance
Hacking Phase 2 – Scanning
Hacking Phase 3 – Gaining Access
Hacking Phase 4 – Maintaining Access
Hacking Phase 5 – Clearing Tracks
Vulnerability Management Life Cycle
Vulnerability Management Lab
DAY 2
Splunk
DDOS
Botnet
Command and Control
Application Blocking
Malware Blocking
Anti-Spyware Blocking
Vulnerability Protection
File Blocking
Data Leak Prevention
URL Filtering
DAY 3
Incident Response
Security Incident
Incident Response Process
RACI Matrix
Incident Priority Matrix
Call Tree
RCA Tools
Incident Response Tools
Live Fire Lab