Course Overview

It is a comprehensive course designed to equip participants with in-depth knowledge and practical skills to understand, detect, and mitigate Advanced Persistent Threats (APTs). In the constantly evolving landscape of cybersecurity, APTs represent highly sophisticated and targeted attacks orchestrated by organized collectives, often nation-states or state-sponsored groups. 

This course is essential for security professionals and teams seeking to enhance their capabilities in defending against these intricate and strategic assaults. To bridge critical knowledge gaps in the realm of APTs. Participants will gain insights into the distinctive attributes and behavioral traits of APTs, delve into historical APT attacks, and scrutinize motives and targeted entities. The curriculum progresses to explore the Cyber Kill Chain and APT Life Cycle, providing a comprehensive understanding of attack vectors and indicators of APT infiltration. Practical techniques, including sandbox utilization and whitelisting, will be addressed, along with insights into real-life APT threat actor methodologies, ensuring participants are well-prepared to face modern cyber threats.

By the end of the course, participants will not only possess an in-depth understanding of APT behaviors but will also have practical skills to preemptively detect, effectively mitigate, and respond to APT attacks. Armed with this knowledge, individuals will be well-equipped to contribute to their organization's cybersecurity posture, craft comprehensive reports, and implement optimal tools for detecting and eradicating APT agents and attacks. The course empowers participants to be proactive defenders in the ever-evolving landscape of cybersecurity.

What You Will Learn

  • Understand the characteristics and objectives of Advanced Persistent Threats.
  • Explore APT attack vectors and lifecycle stages.
  • Differentiate APTs from traditional cyberattacks.
  • Hands-on Techniques for attributing APTs to threat actors.
  • Implement APT detection and prevention strategies.
  • Incident response and recovery measures for APT incidents.
  • Analyze and learn from real APT case studies.
  • Mitigation strategies and future trends in APT defense.

Program Curriculum

  • Chapter Introduction
  • Definition, Characteristics, Challenges and Objectives
  • Types of Threat Actors: Nation-States, Cybercriminal Organizations, Etc.
  • Chapter Conclusion
  • Chapter 1 Quiz
  • $7 Million Cybersecurity Scholarship by EC-Council

  • Chapter Introduction
  • APT Attack Kill Chain Theory
  • Historical APT Examples
  • Case Study 1
  • Case Study 2
  • Challenges and Constraints
  • Chapter Conclusion
  • Chapter 2 Quiz

  • (Reconnaissance) Basic and Hands-on (Passive)
  • Reconnaissance) Basic and Hands-on (Active)
  • (Weaponization) Malwares/Exploits Hands-on
  • (Weaponization) Obfuscation & Hands-on
  • (Delivery) Social Engineering Tactics & Theory
  • (Delivery) Phishing Attacks Tactics and Hands-on
  • (Exploitation) Malicious Physical Devices Hands-on
  • (Installation) Privilege Escalation Techniques & Hands-on
  • (Command & Control) Vulnerabilities & Misconfigurations Hands-on
  • (Action on Objectives) Data Exfiltration Techniques and Hands-on
  • Chapter Conclusion
  • Chapter 3 Quiz

  • Indicators of Compromised
  • Signature-Based Vs. Behavior-Based Detection
  • ntrusion Detection Systems (IDS) And Intrusion Prevention Systems (IPS)
  • Security Information and Event Management (SIEM) Operations and Hands-On
  • Chapter Conclusion
  • Chapter 4 Quiz

  • Designing A Comprehensive Apt Defense Strategy for Organizations.
  • Building A Proactive Cyber Defense Culture Against APTs
  • Chapter Conclusion
  • Chapter 5 Quiz

  • Developing an APTIncident Response Plan
  • Isolating Compromised Systems and Preventing Lateral Movement
  • Eradicating APT Presence and Restoring Systems to a Secure State
  • Chapter Conclusion
  • Chapter 6 Quiz

  • Overview of Major Concepts from the Course
  • Resources for More Information
  • Thank You and Contact Information
Load more modules

Instructor

Samuel Ng

Samuel, passion fueled cybersecurity professional with leadership trained by Armed Forces, Captain. (Rtd) Samuel has extensive experience in all cybersecurity domains from both technical and management perspective with executive presence working alongside senior management in various corporate industries, government & military sectors. He brought value to organizations by orientating governance, controls, risks, and business strategies ultimately upholding the CIA Triad (Confidentiality, Integrity, Availability) at highest standards to risk appetite accordingly. As a Malaysian Army veteran with master’s degree and multiple infosec-recognized certifications such as CREST CPSA, CREST CRT, CISSP, OSCP and etc., he is now contributing to various sectors in Hong Kong including banking and financial industries, cloud, IT infrastructures, virtual banks, crypto, digital assets, R&D etc. Samuel is an active member of Cloud Security Alliance (CSA): Hong Kong & Macau Chapter as Vice Chairman of Programs & Research, actively participating in various cybersecurity events as speaker, panelist, and moderator. Currently exercising his expertise in the realm of cryptocurrency and digital assets, making efforts to create value in every way possible with a never-stop-learning attitude.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Courses

1 of 8