Loading...
Loading...
CDA.Security
Cybersecurity for every layer of your world. Pick your path.
Mission-based cybersecurity for organizations that refuse to be easy targets. 94 missions, 6 defense domains, certified operators.
Personal breach monitoring, device security, password health, and family protection through CDA.Shield.
Earn your callsign. Train through CDA.Institute, certify across six domains, and deploy on real missions through CDArmy.
Free tools, open intelligence, and a knowledge base with 1,168 articles. Security should be accessible to everyone.
The Ecosystem
CDA is not a single product. It is an ecosystem of interconnected platforms that unify training, operations, intelligence, and workforce under one framework. Every property serves a role. Every role connects to the mission.
The ecosystem index. Your front door to everything CDA builds, operates, and defends.
Visit property →The mission library. 94 defined missions across 6 defense domains, each with objectives, deliverables, and a completion state.
Visit property →The knowledge base. 1,168 cybersecurity articles covering threats, frameworks, tools, and terminology.
Visit property →The workforce network. Certified operators ranked by callsign, deployed on missions, compensated on outcomes.
Visit property →Training and certifications. Six certification tiers (M0 through M5) aligned to the Planetary Defense Model.
Visit property →The identity portal. Single sign-on, profile management, and callsign assignment for every operator and client.
Visit property →Market intelligence. Curated security tooling, SaaS tracking, and competitive analysis by operators.
Visit property →The client dashboard. Mission tracking, posture reporting, operator comms, and real-time security operations.
Visit property →Leaderboards, points, and payouts. Where operators compete, earn recognition, and track their mission history.
Visit property →Consumer security dashboard. Personal breach monitoring, device tracking, password health, and family protection.
Visit property →Universal cyber credit scoring. Scan any domain, get a security posture grade, and track improvement over time.
Visit property →Free Tools
Security should be accessible to everyone. These tools are free, built on the same framework our operators use, and designed to give you real answers in minutes.
Scan any domain and get a security posture grade in under 60 seconds. No login required.
Try it free →Five-minute self-assessment across all six PDM domains. See where your gaps are before spending a dollar.
Try it free →Enter your industry and organization size. Get a clear list of which compliance frameworks apply to you.
Try it free →Test your team with realistic phishing scenarios. See who clicks, who reports, and where to focus training.
Try it free →How It Works
We start with a Foundational Risk Model (FRM): a comprehensive assessment of your current security posture across all six defense domains. No sales pitch, just facts.
Start your FRMBased on your FRM, we design and deploy targeted missions to close gaps, harden surfaces, and establish operational security. Every mission has a defined outcome.
See the processOngoing operations through your C3 dashboard. Continuous posture monitoring, regular drills, compliance maintenance, and incident response on standby.
Learn moreThe Planetary Defense Model
Every CDA mission, certification, and operator maps to the Planetary Defense Model. Six concentric defense layers from your data at the core to governance at the perimeter.
The vault. What you're protecting.
The walls. Where attackers probe.
The garrison. Daily operations.
The gates. Who gets in.
The scouts. What's coming.
The command tent. Strategic oversight.
Campaign Phases
Every client engagement follows five campaign phases. From initial reconnaissance through ongoing command, each phase has defined missions, deliverables, and exit criteria.
Assessment, discovery, and threat landscape mapping.
Architecture, deployment, and infrastructure hardening.
Configuration tightening, policy enforcement, and surface reduction.
Testing, exercises, tabletop simulations, and red team operations.
Ongoing operations, governance, monitoring, and continuous improvement.
Why CDA
MSSPs sell you monitoring. We sell you outcomes. Every dollar goes toward a mission that moves your security posture forward, not a dashboard someone glances at.
Every engagement is a mission with defined objectives, measurable outcomes, and a completion state. When it is done, it is done.
No 200-page reports that sit on a shelf. Every mission produces a deliverable that moves your security posture forward.
CDArmy operators earn their callsign through certification. They execute missions, not ticket queues.
Missions end. Campaigns conclude. You pay for outcomes, not for someone to keep watching a dashboard.
The Playbook
The Theater of Operations is the complete CDA mission catalog. Every mission has defined objectives, deliverables, estimated duration, required operator tier, and a clear completion state. No ambiguity. No scope creep.
94
Defined missions across all domains
6
PDM defense domains covered
5
Campaign phases per engagement
CDArmy
CDArmy is the workforce network behind every CDA engagement. Operators (Mercs) earn certification through CDA.Institute, receive a callsign, and execute missions across all six defense domains.
Sentry
Entry-level operator
Operator
Mission-ready
Analyst
Threat analysis
Engineer
Architecture
Architect
Domain mastery
Commander
Strategic lead
Every operator carries a callsign: a rank, name, and personalization that tracks across every mission, certification, and payout. The callsign is the credential.
Learn About CDArmyIndustry-Specific Defense
Every industry faces unique threats, regulatory requirements, and operational constraints. CDA tailors its mission catalog to your sector.
Latest from CDA
Practical security content written by operators, not marketers.
The monitoring model was built for enterprises with 50-person SOC teams. Here is why it breaks down at every other scale, and what replaces it.
Read more →Most security programs cover three domains at best. The Planetary Defense Model covers all six, from your data vault to your board room.
Read more →What happens after you sign up. From FRM to mission execution, a transparent look at how CDA engagements actually work.
Read more →Pricing
Every tier includes access to C3, defined mission capacity, and operators certified through CDA.Institute. Scale up as your security posture matures.
SMB entry point. Core defense across all six domains.
Mid-market. Full campaign execution with dedicated operators.
Enterprise. Multi-domain operations with strategic oversight.
Critical infrastructure and government. Custom engagement.
94
Defined Missions
6
Defense Domains
1,168
Wiki Articles
6
Certification Levels
Cybersecurity for your business, your family, your career, and your community. 94 missions. 6 defense domains. One ecosystem. Start with a free assessment and see where you stand.