What You Need to Know Before
You Start

Starts 9 June 2025 15:56

Ends 9 June 2025

00 days
00 hours
00 minutes
00 seconds
course image

Learning From Pirates of the Late 1600s - The First APT - Adam Hogan

Explore the parallels between 17th-century pirates and modern cybersecurity threats, examining historical strategies for combating piracy and their relevance to today's digital landscape.
via YouTube

2565 Courses


58 minutes

Optional upgrade avallable

Not Specified

Progress at your own speed

Conference Talk

Optional upgrade avallable

Overview

Explore the parallels between 17th-century pirates and modern cybersecurity threats, examining historical strategies for combating piracy and their relevance to today's digital landscape.

Syllabus

  • Introduction to Historical Piracy
  • Overview of piracy in the late 1600s
    Key figures and events
    Economic and political impact of piracy
  • Lifestyle and Tactics of 17th-Century Pirates
  • Pirate hierarchies and governance
    Strategies for attacking and eluding capture
    Tools and technologies used by pirates
  • Modern Cybersecurity Threats
  • Definition and types of Advanced Persistent Threats (APTs)
    Comparing pirates to modern cyber attackers
    The economic impact of cyber threats
  • Historical Counter-Piracy Measures
  • Naval responses and alliances
    Economic and legal tactics against piracy
    Successes and failures
  • Cybersecurity Strategies Against APTs
  • Detection and prevention methods
    Building secure systems and networks
    Legal and cooperative approaches
  • Parallels Between Past and Present Threats
  • Similarities in pirate and hacker motivations
    Comparative analysis of tactics and countermeasures
    Historical lessons applied to modern cybersecurity
  • Case Studies
  • Notable pirates and pirate takedowns
    Real-world APT incidents and responses
    Analysis and lessons learned
  • From Pirates to Hackers: The Evolution of Threats
  • The transformation from physical to digital threats
    Technology's role in evolving security measures
    Implications for future security landscapes
  • Conclusion and Reflection
  • Recap of lessons learned
    Discussion on the ongoing battle against digital threats
    Future outlook for cybersecurity models based on historical understanding
  • Course Project
  • Analyze a specific piracy case and draw cybersecurity parallels
    Develop a modern security plan using historical insights

Subjects

Conference Talks