Why CDeX Training Stands Out
What makes CDeX unique? It’s all about realism and adaptability. Every scenario we create is rooted in real-world cyber threats, offering participants an excellent opportunity to learn by doing.
From national defence IT teams to individual professionals, our training caters to diverse audiences with varying levels of expertise. With flexible formats—MAIN scenarios for deep immersion and atomized modules for quick learning—you can tailor the experience to your needs.
And every scenario is built around the MITRE ATT&CK framework, a global standard for understanding and countering cyber tactics. This ensures you’ll gain actionable knowledge and skills to protect against real-world threats.
Types of Scenarios in Our Catalogue
Our training scenarios fall into three exciting categories, each designed to challenge and educate in unique ways:
- Blue vs. Red Scenarios: These simulate the thrilling dynamics of attackers (Red Team) versus defenders (Blue Team). For example, in Cosmic Problem, participants must analyse logs, conduct memory forensics, and scrutinize network traffic to stop multi-stage attacks aimed at disrupting critical systems. It’s a test of analytical thinking and quick response under pressure.
- Automated Scenarios: Pre-configured challenges simulate dynamic cyberattacks, teaching participants to react to ever-changing threats. In the APT-41 scenario, trainees encounter advanced persistent threat techniques, learning to identify and mitigate sophisticated intrusion attempts.
- Capture the Flag (CTF): These gamified scenarios turn learning into an interactive puzzle-solving experience. Take CTF Bravo, for instance, where participants explore vulnerabilities in virtual machines and docker containers, working to uncover hidden “flags” across categories like cryptography, forensics, and reverse engineering.
Spotlight: Maritime Cybersecurity
A standout addition to our catalogue is the Maritime Cybersecurity Scenario, developed with Shipadvisors and Antwerp Maritime Academy. This groundbreaking training addresses the rising cyber risks in the maritime industry, where over 80% of global trade takes place.
What Makes It Unique?
Participants are placed aboard the MV Vigilant Sailor, a simulated 150 m tanker navigating from Tees Port to Antwerp. They assume critical roles—such as Ship Master, Chief Engineer, or Chief Officer—and manage operational tasks while fending off cyberattacks.
Real Challenges, Real Skills
- Encounter phishing emails disguised as operational messages.
- Detect malware hidden in software updates.
- Face advanced navigational cyberattacks like GPS jamming and AIS spoofing, which manipulate critical ship systems.
By the end of the scenario, maritime professionals gain hands-on experience that boosts both operational and cybersecurity skills, preparing them for today’s—and tomorrow’s—threats.
Examples of Other Scenarios
Windows Active Directory Attacks
In this scenario, participants learn to safeguard enterprise networks by tackling attacks targeting Active Directory configurations. From mitigating password spraying to detecting privilege escalation, this scenario provides an essential toolkit for defending enterprise IT environments.
Secure OT Architecture
Designed for critical infrastructure professionals, this training focuses on defending SCADA systems against cyberattacks. Participants learn to identify vulnerabilities, contain threats, and maintain the integrity of industrial control systems.
Linux Web App Attacks
For those focused on web security, this scenario explores vulnerabilities from the OWASP Top 10. Trainees dive into issues like SQL injection and cross-site scripting, learning to detect, mitigate, and prevent these common attack vectors.
Flexible Learning for Every Schedule
CDeX scenarios are designed with flexibility in mind. Whether you have an hour or an entire day, there’s a training session tailored for you:
- Short Modules: Perfect for quick, focused learning, like Phishing with Malicious Attachments, where participants practice identifying and blocking deceptive emails.
- Comprehensive Training: Dive deep with scenarios like Windows Backdooring, which teaches methods to identify, remove, and prevent backdoors in Windows systems while maintaining network availability.
Aligned with MITRE ATT&CK
Every scenario integrates the globally recognized MITRE ATT&CK framework, ensuring participants gain a thorough understanding of adversarial techniques and countermeasures. Scenarios like Database Attacks teach practical responses to data exfiltration, while Windows Exchange Attacks highlights how to defend against sophisticated phishing and credential theft.
Start Your Training Journey Today
Cybersecurity isn’t just about responding to incidents—it’s about staying prepared. Whether you’re protecting corporate networks, securing critical infrastructure, or navigating the high seas, CDeX’s training catalogue has a scenario for you.
Explore the catalogue, embrace the challenge, and build the resilience you need to face the cyber threats of today and tomorrow.
Don’t wait—contact CDeX and take the first step toward mastering the art of cyber defence.
Table of contents