Advanced Persistent Threats: The Big Picture
Offered By: Pluralsight
Course Description
Overview
Advanced Persistent Threats, the most infamous yet misunderstood types of threats against your organization. This course will teach you everything you want to know about them from origins and goals, to practical detection, and defense against an APT.
Whether you've been in the information security field or not, you've definitely heard of them. Advanced Persistent Threats (APT), are responsible for some of the largest cyber-attacks in history. How do you defend against these threats? Where do you even begin? In this course, Advanced Persistent Threats: The Big Picture, you'll learn everything that you might want to know about APTs. First, you'll develop an understanding of their motives and identities. Next, you'll explore when to classify a threat as an APT, and more importantly, when not to. Then, you'll learn how to assess your own risk and set up a system to detect these threats before it's too late. Finally, you'll finish up with implementing practical defense mechanisms. By the end of this course, you'll understand where APTs come from, what their goals are, how to detect and classify them, and minimize risk of threat from APTs.
Whether you've been in the information security field or not, you've definitely heard of them. Advanced Persistent Threats (APT), are responsible for some of the largest cyber-attacks in history. How do you defend against these threats? Where do you even begin? In this course, Advanced Persistent Threats: The Big Picture, you'll learn everything that you might want to know about APTs. First, you'll develop an understanding of their motives and identities. Next, you'll explore when to classify a threat as an APT, and more importantly, when not to. Then, you'll learn how to assess your own risk and set up a system to detect these threats before it's too late. Finally, you'll finish up with implementing practical defense mechanisms. By the end of this course, you'll understand where APTs come from, what their goals are, how to detect and classify them, and minimize risk of threat from APTs.
Syllabus
- Course Overview 1min
- What Is an Advanced Persistent Threat? 19mins
- Understanding the History of APTs 20mins
- How Does an APT Work? 14mins
- Who Are They, and Why Do They Do What They Do? 10mins
- How Do You Detect APTs? 14mins
- Defending Against APTs: Best Practices and Mitigation Strategies 27mins
Taught by
Rithwik Jayasimha
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network