Course Overview
Our 2-day, instructor-led Cyber Threat Counter Exploitation Training course will teach students how to:
- Set up digital traps
- Misdirect and divert attackers
- Configure honeypots
- Mitigate encrypted crimeware
- Identify malicious software groups.
Before taking this course, students should have prior experience responding to security intrusions and other incidents from an APT
Schedule
Currently, there are no public classes scheduled. Please contact a Phoenix TS Training Consultant to discuss hosting a private class at 240-667-7757.
![[image]](https://phoenixts.com/wp-content/themes/phoenixts-com/assets/images/temp/image-9@2x.jpg)
Not seeing a good fit?
Let us know. Our team of instructional designers, curriculum developers, and subject matter experts can create a custom course for you.
Learn more about custom training
Course Outline
What Is Advanced Persistent Security?
- Protection
- Detection
- Reaction
- Defense in depth
- What is advanced persistent security?
- Advanced persistent threat and advanced persistent security
- Applying advanced persistent security to the Sony hack
Concepts And Foundation
- Cyberwarfare concepts
- What is proaction?
- Risk management
- How to hack computers
- Threat
- Adversary infrastructure
Protection
- Governance
- Vulnerabilities to address
- Countermeasures
- Security culture
- What is threat intelligence?
Detection
- What is detection?
- Detection deficit disorder
- The human intrusion detection system
- Kill chain analysis
Reaction
- Setting reaction strategy
- Incident response and investigations
Implementation
- Know yourself
- Know your adversaries
- Define your strategy
- Determining the appropriate countermeasures
- Advanced persistent security