What You Need to Know Before
You Start
Starts 9 June 2025 21:19
Ends 9 June 2025
00
days
00
hours
00
minutes
00
seconds
49 minutes
Optional upgrade avallable
Not Specified
Progress at your own speed
Conference Talk
Optional upgrade avallable
Overview
Learn to create deception infrastructure for detecting attackers, covering security practices, detection tools, and strategies like fake information and admin accounts.
Syllabus
- Introduction to Deception Infrastructure
- Fundamentals of Cybersecurity Practices
- Detection Tools and Techniques
- Designing a Deception Architecture
- Implementing Fake Information
- Creating and Managing Fake Admin Accounts
- Strategies for Monitoring and Response
- Case Studies and Real-world Applications
- Ethical Considerations and Legal Compliance
- Future Trends in Deception Technologies
- Practical Workshop
- Conclusion and Next Steps
Overview of deception technology
Importance and benefits of a deception infrastructure
Basic security principles
Types of threats and vulnerabilities
Overview of common detection tools
Setting up and configuring detection systems
Key components in a deception infrastructure
Best practices for creating convincing decoys
Strategies for selecting and using fake data
Techniques for integrating fake data into systems
Purpose and creation of deceptive accounts
Monitoring and managing fake accounts for threat detection
Identifying indicators of compromise
Developing an incident response plan
Analysis of successful deception strategies
Lessons learned from deployment failures
Ethics of using deception in cybersecurity
Legal implications and data protection laws
Emerging technologies and innovations
How AI is influencing deception tactics
Hands-on session to set up a basic deception environment
Applying learned concepts to real scenarios
Course summary and key takeaways
Resources for further learning and exploration
Subjects
Conference Talks