Certified Cyber Defender Associate (CCDA)

Build the skills necessary to defend the network against new age cyber-attacks.

Just as every military and police force needs a firing range to hone weapons skills and battle tactics,
every Next-Gen Cyber Defender needs access to a Cyber Range.

Course details, modules & more

Only with an Internet-scale, operationally-relevant, and ever-current Cyber Range organizations can produce the empirically valid cyber war-gaming scenarios necessary to develop IT staff skills and
instincts for defensive action.

 

Similarly, the only way to understand the resiliency of IT infrastructures is to assault every element within them using the high-stress, real-world conditions created in the controlled environment of a Cyber Range.

Our cyber security training program, Certified Cyber Defender Associate (CCDA) helps security teams build the skills necessary to defend their network against new age cyber-attacks.

 

Participants of this program will develop a deep understanding and advanced skills to formulate defense strategies against sophisticated cyber attacks. With our cyber range program, your cyber security personnel can build the capabilities and competencies necessary to secure your organization and critical assets.

This training program require participants to formulate defense responses using next-generation firewalls, intrusion prevention systems, URL filters, anti-spyware systems, anti-virus systems, anti-DDOS systems, data filters and file blocking systems and advanced application based protection systems.

Participants will also be required to correlate information from the sources mentioned and collaborate with other team members to further develop a comprehensive cyber defense strategy.

Who should attend?

This programme is meant for anyone who is looking to up skill their level of security operations proficiency, multi-skill themselves in cyber security or to take on cyber-security related job roles.

Cyber Security Professionals

System/Network Administrators

Information security officers / ISMS manager

ICTSOs / CIOs / CISOs / CSOs / CTOs

Security auditors, & governance and compliance officers

Benefits

 

Learn to formulate defense responses using existing cyber security technology

Gain advanced skills to build defense strategies against cyber-attacks

Develop the ability to correlate cyber security related information from multiple sources

Boost earning capability

Improve credibility in terms of Information Security qualifications and experience

DAY 1

Module 1: Overview

Current Threat Landscape

Modern Day Threats

Module 2: Cyber Defense Strategy

CIS Critical Security Controls

Cyber Range Malaysia

Module 3: Information Assurance

Confidentiality, Availability & Integrity

Information Security Management Framework

Module 4: Information Warfare

Blue Team & Red Team

Hacking Phase 1 – Reconnaissance

Hacking Phase 2 – Scanning

Hacking Phase 3 – Gaining Access

Hacking Phase 4 – Maintaining Access

Hacking Phase 5 – Clearing Tracks

Module 5: Vulnerability Administration Management

Vulnerability Management Life Cycle

Vulnerability Management Lab

DAY 2

Module 6: Monitoring and Defending Against DoS Attacks

Splunk

DDOS

Botnet

Command and Control

Module 7: Advanced Defensive Security Operations

Application Blocking

Malware Blocking

Anti-Spyware Blocking

Vulnerability Protection

File Blocking

Data Leak Prevention

URL Filtering

DAY 3

Module 8: Incident Response & Management

Incident Response

Security Incident

Incident Response Process

RACI Matrix

Incident Priority Matrix

Call Tree

RCA Tools

Incident Response Tools

Module 9 – Live Fire Lab

Live Fire Lab

Register your interest!

Let us help you get your CCDA certification
Fields marked with an * are required

(optional)

(optional)