Whether you've been in the information security field or not, you've definitely heard of them. Advanced Persistent Threats (APT), are responsible for some of the largest cyber-attacks in history. How do you defend against these threats? Where do you even begin? In this course, Advanced Persistent Threats: The Big Picture, you'll learn everything that you might want to know about APTs. First, you'll develop an understanding of their motives and identities. Next, you'll explore when to classify a threat as an APT, and more importantly, when not to. Then, you'll learn how to assess your own risk and set up a system to detect these threats before it's too late. Finally, you'll finish up with implementing practical defense mechanisms. By the end of this course, you'll understand where APTs come from, what their goals are, how to detect and classify them, and minimize risk of threat from APTs.
Learning Objectives
- Advanced Persistent Threats
- History of APTs
- How APTs Work
- APT Detection
- Defending Against APTs
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- All-Source Analysis
- Cyber Defense Analysis
- Exploitation Analysis
- Incident Response
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.