Course Overview

The field of cybersecurity has been evolving rapidly in the last years, the fact that most corporations had to reinvent themselves and move to cyberspace. This generated a much larger attack surface on the internet, allowing a much more successful number of cyber-attacks. 

The ability to detect and block an attack is becoming more important to do so promptly. The attacks that cause the most extensive damage, either with data leaks or damage to the corporations, are advanced persistence threads by being able to detect the attacks in the reconnaissance phase or an early stage of intrusion.

This course focuses on cyber deception, an area of cybersecurity that can help us identify potential attacks and divert the interest of attackers from valuable environments using decoys and other strategies.

In this course, you will learn why cyber deception represents a significant security control in cybersecurity. More importantly, you will understand why cyber deception needs a greater understanding of attackers and improved security to deliver.

This course is focused on cyber deception techniques in current and future infrastructures and how they can be implemented.

Further, you will understand why the use of cyber deception techniques will help in intrusion detection. Particular focus will be provided on which technologies we can use and deploy to decoy the attackers to detect their practices or study their methods to meet the goal of the most secure, most protected systems possible.

What You Will Learn

  • Understand the importance of securing and protecting your infrastructure and data.
  • Familiarize yourself with the different tools that can be used to implement cyber deception.
  • Figure out the best way of deploying decoys is to effectively draw an attacker.
  • Learn about the practical steps necessary to assess and improve infrastructure protection.

Program Curriculum

  • High-Level Overview of Course
  • Preparing Your Lab Environment from WIN
  • Preparing Your Lab Environment from Linux
  • Quick Overview of Cybersecurity in Numbers
  • $7 Million Cybersecurity Scholarship by EC-Council
  • Chapter 1 Lab

  • Introduction to the Concept of Cyber Deception
  • Knowing the Enemy
  • Attack Vectors
  • Chapter 2 Lab
  • Chapter 2 Quiz

  • Origins of Deception as a Weapon
  • How Can I Be a Victim of Deception?
  • Can My Organization Be Spoofed?
  • Chapter 3 Lab
  • Chapter 3 Quiz

  • Analyzing the Current Infrastructure
  • How Can We Get the Attackers to Identify Themselves?
  • What Data Can Be Collected?
  • Chapter 4 Lab
  • Chapter 4 Quiz

  • Introduction to Honeypots
  • Honeypots Architecture
  • Honeypots Can Be Detected
  • Deploying a Honeypot
  • Chapter 5 Lab
  • Chapter 5 Quiz

  • Honey Tokens
  • Other Ways of Generating Alerts
  • After the Alert
  • Chapter 6 Lab
  • Chapter 6 Quiz

  • Tools and Techniques - Part1
  • Tool Demo
  • Chapter 7 Lab
  • Chapter 7 Quiz

  • Overview of Key Takeaways from Course
  • Additional Resources
  • Chapter 8 Quiz
Load more modules

Instructor

Salvador Beltrán Obiol

Salvador Beltrán Obiol worked for the largest telecommunication infrastructure provider in Spain and is now working in the cybersecurity department of a Fortune 500 company in the US. His experience extensive experience in research and work environments gives him a unique perspective on systems. His knowledge of telecommunications and networks (wired and wireless) allows for a well-rounded view of infrastructures. Salvador has managed deployments involving thousands of network equipment and endpoints. Allowing the opportunity to see, prevent, and help recover from several security incidents in different infrastructures in several sectors, including critical resources and infrastructure.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Courses

1 of 8