×
Phoenix TS

Cyber Threat Counter Exploitation Training

This course is designed to teach you how to assess a network’s vulnerabilities, zero in on targets, and effectively block intruders.

BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!

Course Overview

Our 2-day, instructor-led Cyber Threat Counter Exploitation Training course will teach students how to:

  • Set up digital traps
  • Misdirect and divert attackers
  • Configure honeypots
  • Mitigate encrypted crimeware
  • Identify malicious software groups.

Before taking this course, students should have prior experience responding to security intrusions and other incidents from an APT

Schedule

Currently, there are no public classes scheduled. Please contact a Phoenix TS Training Consultant to discuss hosting a private class at 301-258-8200.

[image]

Not seeing a good fit?

Let us know. Our team of instructional designers, curriculum developers, and subject matter experts can create a custom course for you.

Contact Us

Learn more about custom training

Course Outline

What Is Advanced Persistent Security?

  • Protection
  • Detection
  • Reaction
  • Defense in depth
  • What is advanced persistent security?
  • Advanced persistent threat and advanced persistent security
  • Applying advanced persistent security to the Sony hack

Concepts And Foundation  

  • Cyberwarfare concepts
  • What is proaction?
  • Risk management
  • How to hack computers
  • Threat
  • Adversary infrastructure

Protection

  • Governance
  • Vulnerabilities to address
  • Countermeasures
  • Security culture
  • What is threat intelligence?  

Detection

  • What is detection?
  • Detection deficit disorder
  • The human intrusion detection system
  • Kill chain analysis

Reaction

  • Setting reaction strategy
  • Incident response and investigations

Implementation

  • Know yourself
  • Know your adversaries
  • Define your strategy
  • Determining the appropriate countermeasures  
  • Advanced persistent security

BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!

Phoenix TS is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints re-garding registered sponsors may be submitted to the National Registry of CPE Sponsors through its web site: www.nasbaregistry.org

Subscribe now

Get new class alerts, promotions, and blog posts

Phoenix TS needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.

Download Course Brochure

Enter your information below to download this brochure!

Name(Required)