CDIC: Certified DDoS Incident Commander | Flowtriq
Detection, Mitigation & Response

Detect and mitigate DDoS attacks in under 1 second, respond automatically, and keep your users informed.

All features →
Learn
Documentation Quick Start API Reference Agent Setup DDoS Protection Landscape State of DDoS 2026 REPORT Free Certifications NEW
Research & Guides
Mirai Botnet Kill Switch Research memcached Amplification Dynamic Baselines PCAP Forensics PagerDuty Setup
Company
About Us Partners Whitelabel / Reseller Affiliate Program Pay with Crypto System Status
Legal & Support
Contact Us Security Trust Center Terms Privacy SLA
Who Uses Flowtriq

From indie hosts to ISPs, see how teams like yours use Flowtriq to detect and stop DDoS attacks.

Talk to Us →
Infrastructure
Hosting Providers ISPs MSPs/MSSPs Small Operators Routers Edge Node Defense
Gaming
Game Server Hosting Game Studios
Business
SaaS Platforms E-Commerce Financial Services Compliance
Free Certification
Expert

CDIC: Certified DDoS Incident Commander

Demonstrate expert-level mastery of DDoS incident command. Lead war rooms, coordinate cross-team response, preserve forensic evidence, and drive blameless post-mortems.

25 Questions 85% to Pass ~25 Minutes Free

What You'll Be Tested On

The exam covers five expert-level modules of DDoS incident command.

Module 1

Incident Detection & Triage

Severity classification, impact assessment, MTTD/MTTR metrics, attack fingerprinting, false positive reduction, and initial triage procedures.

Module 2

War Room Leadership

Incident Commander role, scribe, comms lead, SME coordination, runbook design, cross-team coordination (NOC, SOC, DevOps, legal), and real-time decision-making.

Module 3

Communication & Escalation

Executive briefings, customer notifications, status page management, ISP/CDN/law enforcement escalation, communication templates, and ISAC threat intelligence sharing.

Module 4

Forensics & Evidence

Packet capture preservation, log integrity, chain of custody, GDPR breach notification, PCI incident reporting, attack attribution challenges, and regulatory reporting.

Module 5

Post-Mortem & Improvement

Blameless post-mortems, timeline reconstruction, action items, SLA impact analysis, continuous improvement processes, and metrics-driven response optimization.