Course details

Information Security: APT Defenses

Information Security: APT Defenses


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

In this 13-video course, discover key Advanced Persistent Threat (APT), concepts such as defense and best practices. Explore common APT attacks and mitigation techniques that can be used, APT tools, and how to create effective APT checklists. You will begin with an introduction to APT and its purpose, then look at the steps of the APT lifecycle. Learners will examine motives behind an APT and probable targets, and learn to identify APT defense best practices. Next, you will explore methods that can be used to strengthen APT defenses, and then recall the method(s) to deal with APTs. You will then take a look at the Equation aka APT group and its involvement in various cyber crimes. Another tutorial examines the key tools that are used when conducting an APT. Define risk assessment processes that can help you protect your assets. In the final tutorial in this course, you will be asked to identify key points for creating an effective checklist to address APT attacks.



Expected Duration (hours)
1.4

Lesson Objectives

Information Security: APT Defenses

  • introduce the key concepts of the course
  • define an Advanced Persistent Threat and its purpose
  • list the steps of the APT lifecycle
  • describe the motives behind an APT and the probable targets
  • identify APT defense best practices
  • identify the methods that can be used to make the APT defenses stronger
  • recall the method(s) to deal with Advanced Persistent Threats
  • describe the Equation AKA APT group and its involvement in various cyber crimes
  • list the tools that are used when conducting an APT
  • define risks and recall methods used to response, reduce, avoid, accept, and transfer risks
  • define the risk assessment processes that can help you protect your assets
  • identify the key points for creating an effective checklist to address APT attacks
  • summarize the key concepts covered in this course
  • Course Number:
    it_saseandj_01_enus

    Expertise Level
    Beginner