What You Need to Know Before
You Start
Starts 8 June 2025 16:13
Ends 8 June 2025
00
days
00
hours
00
minutes
00
seconds
54 minutes
Optional upgrade avallable
Not Specified
Progress at your own speed
Conference Talk
Optional upgrade avallable
Overview
Explore advanced persistent threat development techniques to enhance your cybersecurity skills and understand sophisticated attack methodologies for improved network defense.
Syllabus
- Introduction to Advanced Persistent Threats (APTs)
- The Cyber Kill Chain in APTs
- Reconnaissance Techniques
- Initial Access and Exploitation
- Persistence Mechanisms
- Privilege Escalation Tactics
- Command and Control (C2) Strategies
- Lateral Movement within Networks
- Evasion and Anti-Forensics
- Data Exfiltration Techniques
- Post-exploitation Analysis
- Defensive Measures and Mitigation Strategies
- Case Studies and Real-world Scenarios
- Ethical Considerations and Responsible Disclosure
Definition and key characteristics of APTs
Historical examples of APTs and their impact
Phases of the cyber kill chain
Analysis and manipulation of each phase
Open-source intelligence (OSINT) gathering
Network scanning and vulnerability identification
Exploit development and zero-day vulnerabilities
Social engineering and spear phishing
Maintaining long-term access
Using legitimate tools and custom backdoors
Identifying misconfigurations and vulnerabilities
Bypassing security controls
Designing resilient and covert C2 channels
Communication protocols and data exfiltration techniques
Techniques for lateral movement
Credential harvesting and reuse
Hiding activities and traces
Bypassing endpoint detection and response (EDR) systems
Identifying and exfiltrating sensitive information
Using encryption and obfuscation for secure exfiltration
Assessing the impact and success of an attack
Techniques for covering tracks
Tools and tactics for detecting APTs
Building resilient network defenses
Detailed analysis of past APT incidents
Lessons learned and defensive responses
Legal and ethical implications of APT development
Responsible disclosure practices and collaboration with security communities
Subjects
Conference Talks