Proactive Security Service

The Proactive Security Service evaluates the strength of your defences against the attacks that are most likely to be used by attackers. Our consultants leverage methodologies from our incident responders to provide the most in-depth and real world scenarios possible. The Proactive Security Service provides you with actionable recommendations. All findings are rated based on risk, probability of exploitation and potential business impact. This allows you to address the issues that matter the most to you.

The services include:

Cyber Defence Exercises (Red v Blue)


  • A live technical Red/Blue Team Cyber Defence Exercise (CDX)
  • Blue Teams will have to defend a pre-built virtual network consisting of up to 20 virtual machines against the sophisticated, high-level, real-time, Red Team’s cyber attacks


Exercises are the ultimate tool to Assess your security controls, process and procedures deployed to protect your networks Train your Cyber Defenders against real attacks & malware Develop your procedures, scripts & tools before deploying on operational networks
Assess your cyber security staff. Are they able to distinguish/prevent attacks from “normal” traffic? Train your security tools to identify exploit payloads & reduce false positives Develop lessons identified database
Assess your already implemented security tools & scripts. Do they protect you against Cyber Attacks? Do they need further lockdowns? Train your security professionals & management on Incident Response processes Develop relationships with vendors to further defend your networks


Read More..


Through DefenceCorp’s Training Courses, you will learn the tools, techniques and procedures used by attackers in recent breaches. The training courses are constantly being updated, based on our experience of working on incidents & breaches.

You will learn to:

  • Evaluate and reform offensive and defensive strategies against cyber attacks
  • Evaluate and test tools and procedures
  • Apply system administration and prevention of attacks
  • Monitor networks, detect and respond to attacks
  • Handle cyber incidents effectively
  • Create a Guide for incident response
  • Identify and remedy the blind spots of your current processes

Courses Offered:

  • Web Application Penetration Testing
  • Advanced Offensive Techniques & Defensive Strategies

Read More..