Information Security: APT Defenses

IT Security
  • 13 Videos | 1h 29m 53s
  • Includes Assessment
  • Earns a Badge
Likes 8 Likes 8
In this 13-video course, discover key Advanced Persistent Threat (APT), concepts such as defense and best practices. Explore common APT attacks and mitigation techniques that can be used, APT tools, and how to create effective APT checklists. You will begin with an introduction to APT and its purpose, then look at the steps of the APT lifecycle. Learners will examine motives behind an APT and probable targets, and learn to identify APT defense best practices. Next, you will explore methods that can be used to strengthen APT defenses, and then recall the method(s) to deal with APTs. You will then take a look at the Equation aka APT group and its involvement in various cyber crimes. Another tutorial examines the key tools that are used when conducting an APT. Define risk assessment processes that can help you protect your assets. In the final tutorial in this course, you will be asked to identify key points for creating an effective checklist to address APT attacks.

WHAT YOU WILL LEARN

  • introduce the key concepts of the course
    define an Advanced Persistent Threat and its purpose
    list the steps of the APT lifecycle
    describe the motives behind an APT and the probable targets
    identify APT defense best practices
    identify the methods that can be used to make the APT defenses stronger
    recall the method(s) to deal with Advanced Persistent Threats
  • describe the Equation AKA APT group and its involvement in various cyber crimes
    list the tools that are used when conducting an APT
    define risks and recall methods used to response, reduce, avoid, accept, and transfer risks
    define the risk assessment processes that can help you protect your assets
    identify the key points for creating an effective checklist to address APT attacks
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 55s
    UP NEXT
  • Playable
    2. 
    Advanced Persistent Threat Introduction
    11m 48s
  • Locked
    3. 
    APT Lifecycle
    6m 1s
  • Locked
    4. 
    Motives and Targets of an APT
    5m 6s
  • Locked
    5. 
    APT Defense Best Practices
    4m 1s
  • Locked
    6. 
    Methods to Strengthen APT Defenses
    4m 44s
  • Locked
    7. 
    Dealing with Advanced Persistent Threats
    13m 38s
  • Locked
    8. 
    The Equation Group
    4m 43s
  • Locked
    9. 
    Key Tools Used in APT
    2m 10s
  • Locked
    10. 
    Dealing with Risks
    14m 22s
  • Locked
    11. 
    Risk Assessment to Protect Assets
    12m 34s
  • Locked
    12. 
    APT Checklists
    2m 55s
  • Locked
    13. 
    Course Summary
    57s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 26 Likes 26  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 51 Likes 51