Deception As a Defense
Offered By: Starweaver via Coursera
Course Description
Overview
In this course, defensive concepts will be explored and the power of using deception at different layers of the network. The attacker depends on information that is gathered during their surveillance, and with deception we change the network at layer 2-4 and the result of this is the attacker’s collected data is no longer valid and useless for them, this requires the attacker to start the information gathering process over again. In a robust defensive solution, the network can change multiple times based on the classification of the threat, and each time it changes, the attacker is lost and has to start the recon process over again. These concepts change the game and puts the defender in control! The concepts have been deployed at Capture the Flag events and frustrated and confused the hackers for hours!
Forever you have heard that the hackers are in control and they only need to find one way in. This course will show you how to flip that model and we only need one packet to identify the attacker and prepare our response strategy. We are in control of our networks and this workshop will show you how to take advantage of and achieve that.
Prerequisites:-
1- Basic understanding of IT and cybersecurity concepts.
2- Familiarity with network architecture and operations.
Target Learners:-
1- IT professionals seeking advanced cybersecurity skills.
2- Network administrators and security analysts.
3- Individuals aspiring to specialize in cybersecurity defense strategies.
Syllabus
- Foundations of Cybersecurity and Strategic Defenses
- This module introduces learners to the critical aspects of the cybersecurity landscape, emphasizing the understanding of threats, vulnerabilities, and strategic defense principles. By exploring topics such as threat analysis, vulnerability management, and cybersecurity challenges, students will gain a comprehensive overview of how to protect digital assets effectively.
- Advanced Cybersecurity Strategies and Network Defense Techniques
- Diving deeper into cybersecurity methodologies, this module focuses on advanced strategies and best practices to safeguard networks and mitigate threats. Covering proactive vulnerability tracking, patch management, and reducing the attack surface, students will explore the tactical aspects of network security.
Taught by
Kevin Cardwell
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network