Information Security: APT Defenses

IT Security    |    Beginner
  • 13 videos | 1h 24m 53s
  • Includes Assessment
  • Earns a Badge
Rating 4.3 of 16 users Rating 4.3 of 16 users (16)
In this 13-video course, discover key Advanced Persistent Threat (APT), concepts such as defense and best practices. Explore common APT attacks and mitigation techniques that can be used, APT tools, and how to create effective APT checklists. You will begin with an introduction to APT and its purpose, then look at the steps of the APT lifecycle. Learners will examine motives behind an APT and probable targets, and learn to identify APT defense best practices. Next, you will explore methods that can be used to strengthen APT defenses, and then recall the method(s) to deal with APTs. You will then take a look at the Equation aka APT group and its involvement in various cyber crimes. Another tutorial examines the key tools that are used when conducting an APT. Define risk assessment processes that can help you protect your assets. In the final tutorial in this course, you will be asked to identify key points for creating an effective checklist to address APT attacks.

WHAT YOU WILL LEARN

  • Introduce the key concepts of the course
    Define an advanced persistent threat and its purpose
    List the steps of the apt lifecycle
    Describe the motives behind an apt and the probable targets
    Identify apt defense best practices
    Identify the methods that can be used to make the apt defenses stronger
    Recall the method(s) to deal with advanced persistent threats
  • Describe the equation aka apt group and its involvement in various cyber crimes
    List the tools that are used when conducting an apt
    Define risks and recall methods used to response, reduce, avoid, accept, and transfer risks
    Define the risk assessment processes that can help you protect your assets
    Identify the key points for creating an effective checklist to address apt attacks
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 55s
  • 11m 48s
    In this video, you will learn about Advanced Persistent Threats and their purpose. FREE ACCESS
  • Locked
    3.  APT Lifecycle
    6m 1s
    After completing this video, you will be able to list the steps of the APT lifecycle. FREE ACCESS
  • Locked
    4.  Motives and Targets of an APT
    5m 6s
    Upon completion of this video, you will be able to describe the motives behind an APT and the probable targets. FREE ACCESS
  • Locked
    5.  APT Defense Best Practices
    4m 1s
    Find out how to identify best practices for APT defense. FREE ACCESS
  • Locked
    6.  Methods to Strengthen APT Defenses
    4m 44s
    In this video, you will identify the methods that can be used to make APT defenses stronger. FREE ACCESS
  • Locked
    7.  Dealing with Advanced Persistent Threats
    13m 38s
    After completing this video, you will be able to recall the method(s) to deal with Advanced Persistent Threats. FREE ACCESS
  • Locked
    8.  The Equation Group
    4m 43s
    After completing this video, you will be able to describe the Equation group and its involvement in various cyber crimes. FREE ACCESS
  • Locked
    9.  Key Tools Used in APT
    2m 10s
    After completing this video, you will be able to list the tools that are used when conducting an APT. FREE ACCESS
  • Locked
    10.  Dealing with Risks
    14m 22s
    In this video, you will learn how to define risks and recall methods used to respond to, reduce, avoid, accept, and transfer risks. FREE ACCESS
  • Locked
    11.  Risk Assessment to Protect Assets
    12m 34s
    Find out how to define risk assessment processes that can help you protect your assets. FREE ACCESS
  • Locked
    12.  APT Checklists
    2m 55s
    In this video, you will identify the key points for creating an effective checklist to address APT attacks. FREE ACCESS
  • Locked
    13.  Course Summary
    57s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 3 users Rating 5.0 of 3 users (3)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 29 users Rating 4.4 of 29 users (29)
Rating 4.2 of 19 users Rating 4.2 of 19 users (19)
Rating 4.6 of 4247 users Rating 4.6 of 4247 users (4247)