What You Need to Know Before
You Start

Starts 9 June 2025 21:19

Ends 9 June 2025

00 days
00 hours
00 minutes
00 seconds
course image

Easy Indicators of Compromise - Creating a Deception Infrastructure

Learn to create deception infrastructure for detecting attackers, covering security practices, detection tools, and strategies like fake information and admin accounts.
via YouTube

2565 Courses


49 minutes

Optional upgrade avallable

Not Specified

Progress at your own speed

Conference Talk

Optional upgrade avallable

Overview

Learn to create deception infrastructure for detecting attackers, covering security practices, detection tools, and strategies like fake information and admin accounts.

Syllabus

  • Introduction to Deception Infrastructure
  • Overview of deception technology
    Importance and benefits of a deception infrastructure
  • Fundamentals of Cybersecurity Practices
  • Basic security principles
    Types of threats and vulnerabilities
  • Detection Tools and Techniques
  • Overview of common detection tools
    Setting up and configuring detection systems
  • Designing a Deception Architecture
  • Key components in a deception infrastructure
    Best practices for creating convincing decoys
  • Implementing Fake Information
  • Strategies for selecting and using fake data
    Techniques for integrating fake data into systems
  • Creating and Managing Fake Admin Accounts
  • Purpose and creation of deceptive accounts
    Monitoring and managing fake accounts for threat detection
  • Strategies for Monitoring and Response
  • Identifying indicators of compromise
    Developing an incident response plan
  • Case Studies and Real-world Applications
  • Analysis of successful deception strategies
    Lessons learned from deployment failures
  • Ethical Considerations and Legal Compliance
  • Ethics of using deception in cybersecurity
    Legal implications and data protection laws
  • Future Trends in Deception Technologies
  • Emerging technologies and innovations
    How AI is influencing deception tactics
  • Practical Workshop
  • Hands-on session to set up a basic deception environment
    Applying learned concepts to real scenarios
  • Conclusion and Next Steps
  • Course summary and key takeaways
    Resources for further learning and exploration

Subjects

Conference Talks