×
Cyber Phoenix

Cyber Threat Counter Exploitation Training

This course is designed to teach you how to assess a network’s vulnerabilities, zero in on targets, and effectively block intruders.

Due to Covid-19 safety restrictions PhoenixTS will temporarily be unable to provide food to our students who attend class at our Training Center; however, our Break Areas are currently open where students will find a constant supply of Coffee, Tea and Water. Students may bring their own lunch and snacks to eat in our breakrooms or at their seat in the classroom or eat out at one of the many nearby restaurants.

Course Overview

Our 2-day, instructor-led Cyber Threat Counter Exploitation Training course will teach students how to:

  • Set up digital traps
  • Misdirect and divert attackers
  • Configure honeypots
  • Mitigate encrypted crimeware
  • Identify malicious software groups.

Before taking this course, students should have prior experience responding to security intrusions and other incidents from an APT

Schedule

Cyber Threat Counter Exploitation Training

date
location
price
11/28/22 - 11/29/22 (2 days)

8:30AM - 4:30PM EST

Tysons Corner, VA
Open
$1,195
12/05/22 - 12/06/22 (2 days)

8:30AM - 4:30PM EST

Online
Open
$1,195
12/05/22 - 12/06/22 (2 days)

8:30AM - 4:30PM EST

Columbia, MD
Open
$1,195
[image]

Not seeing a good fit?

Let us know. Our team of instructional designers, curriculum developers, and subject matter experts can create a custom course for you.

Contact Us

Learn more about custom training

Course Outline

What Is Advanced Persistent Security?

  • Protection
  • Detection
  • Reaction
  • Defense in depth
  • What is advanced persistent security?
  • Advanced persistent threat and advanced persistent security
  • Applying advanced persistent security to the Sony hack

Concepts And Foundation  

  • Cyberwarfare concepts
  • What is proaction?
  • Risk management
  • How to hack computers
  • Threat
  • Adversary infrastructure

Protection

  • Governance
  • Vulnerabilities to address
  • Countermeasures
  • Security culture
  • What is threat intelligence?  

Detection

  • What is detection?
  • Detection deficit disorder
  • The human intrusion detection system
  • Kill chain analysis

Reaction

  • Setting reaction strategy
  • Incident response and investigations

Implementation

  • Know yourself
  • Know your adversaries
  • Define your strategy
  • Determining the appropriate countermeasures  
  • Advanced persistent security

Due to Covid-19 safety restrictions PhoenixTS will temporarily be unable to provide food to our students who attend class at our Training Center; however, our Break Areas are currently open where students will find a constant supply of Coffee, Tea and Water. Students may bring their own lunch and snacks to eat in our breakrooms or at their seat in the classroom or eat out at one of the many nearby restaurants.

Subscribe now

Get new class alerts, promotions, and blog posts