Cyber Defence Bureau 

home of Cyber Security

CDB Training

Private Sector

• Access Control Auditing
• Authentication Mechanism Development
• Authentication Mechanism Management
• Big Data Analytics
• Bounty Hunting
• Business Continuity Assurance
• Cloud Systems, Cyber-Physical Systems, Databases, Data Centres, Data Lakes, Distributed Systems, Hardware, Networks, Web Apps, Web Sites
• Critical Infrastructure, EdTech, FinTech, MedTech, MilTech, News Media
• Custom Mechanical Keyboards
• Data Recovery
• Data Shredding
• Forensic Investigation
• Framework Compliance
• GRC Management
• Incident Response Management
• Incident Response Planning
• Incident Response, Rapid Response Team
• Machine Learning Solutions
• Network Mapping
• Network Security Auditing
• Policy and Procedures
• Public Relations Management
• Research and Development
• Secure Communications Management
• Secure Device Destruction
• System Development Lifecycle Management
• System Development Lifecycle Planning
• Threat Hunting
• Threat Intelligence
• Training
• Vulnerability Analysis
• Vulnerability Management


see all services
CDB offencive

Home Use

• Awareness Training
• Custom Mechanical Keyboards
• Data Recovery
• Data Shredding
• Device Vulnerability Analysis
• Educational Training
• Forensic Investigation
• Home Network and Device Vulnerability Management
• Home Network Vulnerability Analysis
• Home Surveillance
• Identity and Reputation Protection
• Secure Communications Management
• Secure Device Destruction


see all services

Public Sector, Intelligence Agencies and Military

• Counter Intelligence
• Forensic Investigation
• Incident Response, Rapid Response Team
• Intelligence
• Offensive Projects
• PMC Field Units
• Policy and Procedures
• Project Black Star C4ISR
• Research and Development
• Secure Communications Management
• Strategic Development Management
• Surveillance and Counter Surveillance
• Take Down Enforcement
• Threat Intelligence
• Threat Modelling with Machine Learning
• Training
• Vulnerability Management
• Critical Infrastructure Continuity Assurance
• Data Verification
• Defensive Projects
• Framework Compliance
• Sentiment Analysis
• Vulnerability Analysis


see all services