Information Security: APT Defenses
IT Security
| Beginner
- 13 videos | 1h 24m 53s
- Includes Assessment
- Earns a Badge
In this 13-video course, discover key Advanced Persistent Threat (APT), concepts such as defense and best practices. Explore common APT attacks and mitigation techniques that can be used, APT tools, and how to create effective APT checklists. You will begin with an introduction to APT and its purpose, then look at the steps of the APT lifecycle. Learners will examine motives behind an APT and probable targets, and learn to identify APT defense best practices. Next, you will explore methods that can be used to strengthen APT defenses, and then recall the method(s) to deal with APTs. You will then take a look at the Equation aka APT group and its involvement in various cyber crimes. Another tutorial examines the key tools that are used when conducting an APT. Define risk assessment processes that can help you protect your assets. In the final tutorial in this course, you will be asked to identify key points for creating an effective checklist to address APT attacks.
WHAT YOU WILL LEARN
-
Introduce the key concepts of the courseDefine an advanced persistent threat and its purposeList the steps of the apt lifecycleDescribe the motives behind an apt and the probable targetsIdentify apt defense best practicesIdentify the methods that can be used to make the apt defenses strongerRecall the method(s) to deal with advanced persistent threats
-
Describe the equation aka apt group and its involvement in various cyber crimesList the tools that are used when conducting an aptDefine risks and recall methods used to response, reduce, avoid, accept, and transfer risksDefine the risk assessment processes that can help you protect your assetsIdentify the key points for creating an effective checklist to address apt attacksSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 55s
-
11m 48sIn this video, you will learn about Advanced Persistent Threats and their purpose. FREE ACCESS
-
6m 1sAfter completing this video, you will be able to list the steps of the APT lifecycle. FREE ACCESS
-
5m 6sUpon completion of this video, you will be able to describe the motives behind an APT and the probable targets. FREE ACCESS
-
4m 1sFind out how to identify best practices for APT defense. FREE ACCESS
-
4m 44sIn this video, you will identify the methods that can be used to make APT defenses stronger. FREE ACCESS
-
13m 38sAfter completing this video, you will be able to recall the method(s) to deal with Advanced Persistent Threats. FREE ACCESS
-
4m 43sAfter completing this video, you will be able to describe the Equation group and its involvement in various cyber crimes. FREE ACCESS
-
2m 10sAfter completing this video, you will be able to list the tools that are used when conducting an APT. FREE ACCESS
-
14m 22sIn this video, you will learn how to define risks and recall methods used to respond to, reduce, avoid, accept, and transfer risks. FREE ACCESS
-
12m 34sFind out how to define risk assessment processes that can help you protect your assets. FREE ACCESS
-
2m 55sIn this video, you will identify the key points for creating an effective checklist to address APT attacks. FREE ACCESS
-
57s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.