What You Need to Know Before
You Start

Starts 8 June 2025 16:13

Ends 8 June 2025

00 days
00 hours
00 minutes
00 seconds
course image

Exploiting the Zeroth Hour - Developing Your Advanced Persistent Threat to Pwn the N

Explore advanced persistent threat development techniques to enhance your cybersecurity skills and understand sophisticated attack methodologies for improved network defense.
via YouTube

2544 Courses


54 minutes

Optional upgrade avallable

Not Specified

Progress at your own speed

Conference Talk

Optional upgrade avallable

Overview

Explore advanced persistent threat development techniques to enhance your cybersecurity skills and understand sophisticated attack methodologies for improved network defense.

Syllabus

  • Introduction to Advanced Persistent Threats (APTs)
  • Definition and key characteristics of APTs
    Historical examples of APTs and their impact
  • The Cyber Kill Chain in APTs
  • Phases of the cyber kill chain
    Analysis and manipulation of each phase
  • Reconnaissance Techniques
  • Open-source intelligence (OSINT) gathering
    Network scanning and vulnerability identification
  • Initial Access and Exploitation
  • Exploit development and zero-day vulnerabilities
    Social engineering and spear phishing
  • Persistence Mechanisms
  • Maintaining long-term access
    Using legitimate tools and custom backdoors
  • Privilege Escalation Tactics
  • Identifying misconfigurations and vulnerabilities
    Bypassing security controls
  • Command and Control (C2) Strategies
  • Designing resilient and covert C2 channels
    Communication protocols and data exfiltration techniques
  • Lateral Movement within Networks
  • Techniques for lateral movement
    Credential harvesting and reuse
  • Evasion and Anti-Forensics
  • Hiding activities and traces
    Bypassing endpoint detection and response (EDR) systems
  • Data Exfiltration Techniques
  • Identifying and exfiltrating sensitive information
    Using encryption and obfuscation for secure exfiltration
  • Post-exploitation Analysis
  • Assessing the impact and success of an attack
    Techniques for covering tracks
  • Defensive Measures and Mitigation Strategies
  • Tools and tactics for detecting APTs
    Building resilient network defenses
  • Case Studies and Real-world Scenarios
  • Detailed analysis of past APT incidents
    Lessons learned and defensive responses
  • Ethical Considerations and Responsible Disclosure
  • Legal and ethical implications of APT development
    Responsible disclosure practices and collaboration with security communities

Subjects

Conference Talks