In this course, defensive concepts will be explored and the power of using deception at different layers of the network. The attacker depends on information that is gathered during their surveillance, and with deception we change the network at layer 2-4 and the result of this is the attacker’s collected data is no longer valid and useless for them, this requires the attacker to start the information gathering process over again. In a robust defensive solution, the network can change multiple times based on the classification of the threat, and each time it changes, the attacker is lost and has to start the recon process over again. These concepts change the game and puts the defender in control! The concepts have been deployed at Capture the Flag events and frustrated and confused the hackers for hours!
Forever you have heard that the hackers are in control and they only need to find one way in. This course will show you how to flip that model and we only need one packet to identify the attacker and prepare our response strategy. We are in control of our networks and this workshop will show you how to take advantage of and achieve that.
Prerequisites:-
1- Basic understanding of IT and cybersecurity concepts.
2- Familiarity with network architecture and operations.
Target Learners:-
1- IT professionals seeking advanced cybersecurity skills.
2- Network administrators and security analysts.
3- Individuals aspiring to specialize in cybersecurity defense strategies.
Overview
Syllabus
- Foundations of Cybersecurity and Strategic Defenses
- This module introduces learners to the critical aspects of the cybersecurity landscape, emphasizing the understanding of threats, vulnerabilities, and strategic defense principles. By exploring topics such as threat analysis, vulnerability management, and cybersecurity challenges, students will gain a comprehensive overview of how to protect digital assets effectively.
- Advanced Cybersecurity Strategies and Network Defense Techniques
- Diving deeper into cybersecurity methodologies, this module focuses on advanced strategies and best practices to safeguard networks and mitigate threats. Covering proactive vulnerability tracking, patch management, and reducing the attack surface, students will explore the tactical aspects of network security.
Taught by
Kevin Cardwell