This instructor-led training (ILT) course equips students with the knowledge and skills needed to effectively test and secure iOS applications.
This instructor-led training (ILT) course equips students with the knowledge and skills needed to effectively test and secure Android applications.
This instructor-led training will help you master Azure and EntraID security and apply red teaming tactics.
This instructor-led training covers the basics to expert level, helping validate your expertise in AWS security.
In partnership with:
In partnership with:
By partnering with leading platforms like Hack The Box, or collaborating with world-class instructors we have created cutting-edge, instructor-led cybersecurity courses based on industry-ready standards that are highly interactive, hands-on, and offer actionable knowledge to your team.
Purple teaming brings together the strengths of both red and blue teams to ensure your defense is as robust as it can be. Secure your infrastructure and outsmart cyber threats with a tailored strategy.
Boost your organization’s defenses with custom-designed cybersecurity training tailored to your industry standards. From beginner-level awareness to advanced threat detection and response, we develop training that meets your unique compliance requirements and security challenges.
Are you struggling with gaining practical experience in applying data science concepts to real-world problems?
This course will get you well-prepared to handle intermediate-level security challenges within SOC environments and develop the expertise to detect, analyze, and respond to complex security incidents.
Fill in the following form and we'll notify you when registration opens.
Tackle real-world data challenges!
Develop the expertise to detect, analyze, and respond to complex security incidents with out-of-the-box thinking. Learn how to correlate disparate pieces of data and pivot to uncover the full scope and impact of an incident. Also learn to create actionable, audience-tailored incident reports and gain the skills needed for effective communication in security operations.
HTB Certified Defensive Security Analyst (CDSA) is a highly hands-on certification that assesses the candidates’ security analysis, SOC operations, and incident handling skills. HTB Certified Defensive Security Analyst (CDSA) certification holders will possess technical competency in the security analysis, SOC operations, and incident handling domains at an intermediate level. They will be able to spot security incidents and identify avenues of detection that may not be immediately apparent from simply looking at the available data/evidence. They will also excel at thinking outside the box, correlating disparate pieces of data/evidence, and pivoting relentlessly to determine the maximum impact of an incident. Another skill they will bring is the creation of actionable security incident reports tailored for diverse audiences.
What You’ll Learn:
✅ SOC Processes & Methodologies
✅ SIEM Operations (ELK/Splunk)
✅ Tactical Analytics
✅ Log Analysis
✅ Threat Hunting
✅ Active Directory Attack Analysis
✅ Network Traffic Analysis (Incl. IDS/IPS)
✅ Malware Analysis
✅ DFIR Operations
Become a HTB Certified Defensive Security Analyst, boost your career and earn more money!
Level:
Entry to
Intermediate
Class schedule:
TBA
Duration:
6 weeks
(8h/week)
Start date:
TBA
Level:
Entry to intermediate
Class schedule:
TBA
Duration:
8 weeks (8h/week)
Start date:
November 18th
Ideal for:
Entry level: Security Analysts, SOC Analysts, Incident Handlers and Forensics Analysts
Penetration Testers
IT Administrators and
IT Security Personnel
> 1 year access to HTB Academy’s labs and content.
> Instructor available for technical support during the office hours (1h/week).
> Exam voucher includes two (2) exam attempts.
> Course materials such as slides, links to further reading, code snippets, lab exercises, etc.
> HTB Defensive Security Analyst Certification after successfully passing the exam.
Access includes:
> Direct Access to all modules up to (including) TIER II
> Direct Access to the entire Bug bounty Hunter role path
> Step-by-step module solutions
> Unlimited Pwn Box usage
Note: In case you already have a HTB Academy subscription please contact us
CBBH course includes:
+ Access to HTB Academy
+ 12 instructor-led sessions
+ Exam Voucher
Fill in the following form and we'll notify you when registration opens.
The mission of Academy’s SOC Analyst job-role path that leads to HTB Certified Defensive Security Analyst (HTB CDSA) is to teach you, guide you and prepare you for the final exam. Any beginner can start practicing on the related modules and build their knowledge on security analysis, without needing to resort to external resources.
More experienced professionals can also benefit from both the SOC Analyst job-role path and the HTB CDSA exam, as they can help them learn new tricks related to security incident analysis, gain additional hands-on experience, or just reinforce what they already know.
The main focus of this certification is to be realistic, so anyone can automatically apply what they learn in their field, regardless of it being, security analysis, SOC operations, or incident handling.
There are some prerequisites around web, operating system, and networking fundamentals (that you can master through the “SOC Analyst Prerequisites” skill path), but the SOC Analyst job-role path is designed to provide a guided learning experience to deliver the notions required to successfully take the exam and be a certified security analyst!
A certification is not a mandatory prerequisite to become a SOC Analyst or practice any other cybersecurity role, but a great asset if you are looking to learn new skills in a structured way and prove your knowledge to potential employers.
Here is our take as Hack The Box:
Hack The Box is a trusted, highly respected, and community-backed IT security training vendor, with a long history in the domain. The training standards of the company are set quite high and this applies to all offerings, machines, challenges, Pro Labs, and now, the certifications.
Through the years, Hack The Box has been a training partner of major organisations, government/military agencies, and academic institutions worldwide. We plan to continue being a trusted training partner, and also provide certification services from now on, while retaining the same level of content-excellence, quality, and integrity.
To prepare effectively for the CBBH program, consider the following recommendations:
Academy Modules Review:
Review the “Introduction to Academy” module
Go through the “Getting Started” module
HTB Certified Defensive Security Analyst (HTB CDSA) is a certification for individuals who want to obtain technical competency in the security analysis, SOC operations, and incident handling domains. The following is a list of prerequisites for a successful outcome:
Participants have access to a dedicated support team for any technical issues, as well as access to instructors during designated office hours for questions related to the course material. Additionally, you can reach out to your instructor during office hours for personalized assistance.
Unfortunately we don’t record our sessions therefore you’ll need to catch up with the rest of the group. The support team can help you to catch up with the previous sessions and guide you on the materials that you need to read.
To prepare effectively for the CDSA program, consider the following recommendations:
Find below the facts that differentiate HTB Certified Defensive Security Analyst (CDSA) from standard certifications:
HTB certifications are on Credly! By the time you successfully complete the HTB CDSA exam and claim your certificate, CDSA’s digital badge will arrive on your email. Accept it and share it on your social media, so that third parties can verify your obtained skills!
To provide the best experiences, we and our partners use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us and our partners to process personal data such as browsing behavior or unique IDs on this site and show (non-) personalized ads. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Click below to consent to the above or make granular choices. Your choices will be applied to this site only. You can change your settings at any time, including withdrawing your consent, by using the toggles on the Cookie Policy, or by clicking on the manage consent button at the bottom of the screen.
Syllabus:
Intro to GCP
Exploitation of GCP Services
Methodologies
Security Services
Syllabus:
Intro to AWS
Exploitation of AWS Services
Methologies
Common Detection Mechanisms
Syllabus:
Azure Basics
Exploitation of Azure Services
Methologies
Common Detection Mechanisms
Fundamentals and Setup
Advanced Techniques and Practical Application
Advanced Techniques and Practical Application
Fundamentals & Setup