TrueschoTruescho
All Courses
Deception As a Defense
Coursera
Course
Unknown

Deception As a Defense

Starweaver

Explore defensive cybersecurity techniques through network deception, disrupting attackers' data collection and forcing them to restart their reconnaissance process.

Unknown2 weeksKK, UZ, English, Spanish

About this Course

In this course, defensive concepts will be explored and the power of using deception at different layers of the network. The attacker depends on information that is gathered during their surveillance, and with deception we change the network at layer 2-4 and the result of this is the attacker’s collected data is no longer valid and useless for them, this requires the attacker to start the information gathering process over again. In a robust defensive solution, the network can change multiple times based on the classification of the threat, and each time it changes, the attacker is lost and has to start the recon process over again. These concepts change the game and puts the defender in control! The concepts have been deployed at Capture the Flag events and frustrated and confused the hackers for hours! Forever you have heard that the hackers are in control and they only need to find one way in. This course will show you how to flip that model and we only need one packet to identify the attacker and prepare our response strategy. We are in control of our networks and this workshop will show you how to take advantage of and achieve that. Prerequisites:- 1- Basic understanding of IT and cybersecurity concepts. 2- Familiarity with network architecture and operations. Target Learners:- 1- IT professionals seeking advanced cybersecurity skills. 2- Network administrators and security analysts. 3- Individuals aspiring to specialize in cybersecurity defense strategies

What You'll Learn

  • Identify emerging cyber threats and network vulnerabilities
  • Apply automated vulnerability assessment techniques
  • Implement advanced defensive measures to improve network security
  • Configure and secure perimeter devices including routers and firewalls

Prerequisites

  • Basic computer and internet skills
  • Ability to follow instructions in English and complete short exercises

Instructors

K

Kevin Cardwell

Computer Security Architect and Consultant

S

Starweaver

Global Leaders in Professional & Technology Education

Topics

Security
Information Technology
Computer Security and Networks
Computer Science
Cyber Attacks
Continuous Monitoring
Patch Management
Cyber Threat Intelligence
Cybersecurity
Threat Modeling

Course Info

PlatformCoursera
LevelUnknown
PacingUnknown
PriceFree

Skills

الأمن السيبراني
تكنولوجيا المعلومات
أمن الشبكات
علوم الحاسوب
الهجمات السيبرانية
المراقبة المستمرة
إدارة التصحيحات
معلومات التهديد السيبراني
Cybersecurity
Threat Modeling

Start Learning Now