• Online, Self-Paced
Course Description

Whether you've been in the information security field or not, you've definitely heard of them. Advanced Persistent Threats (APT), are responsible for some of the largest cyber-attacks in history. How do you defend against these threats? Where do you even begin? In this course, Advanced Persistent Threats: The Big Picture, you'll learn everything that you might want to know about APTs. First, you'll develop an understanding of their motives and identities. Next, you'll explore when to classify a threat as an APT, and more importantly, when not to. Then, you'll learn how to assess your own risk and set up a system to detect these threats before it's too late. Finally, you'll finish up with implementing practical defense mechanisms. By the end of this course, you'll understand where APTs come from, what their goals are, how to detect and classify them, and minimize risk of threat from APTs.

Learning Objectives

  • Advanced Persistent Threats
  • History of APTs
  • How APTs Work
  • APT Detection
  • Defending Against APTs

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • All-Source Analysis
  • Cyber Defense Analysis
  • Exploitation Analysis
  • Incident Response

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.