This course aims to teach learners about early detection through deception. By the end of the course, students will be able to understand the concept of deception, identify different deceptive techniques, such as spear-phishing and credential theft, and apply deception for early threat detection. The course covers skills like recognizing deceptive metadata, setting up deceptive systems, and responding to network intrusions. The teaching method involves a series of videos that provide examples and explanations of various deception techniques. This course is intended for cybersecurity professionals, network administrators, and individuals interested in enhancing their knowledge of threat detection and cybersecurity strategies.
Overview
Syllabus
Intro
What is Deception?
All Rainbows and Unicorns?
Before You Begin...
Gimme Some Examples
Foreign Device on Network
Compromised Trusted System
Messing With the Internet
MOAR DECEPTION
For Example...
Honey Badger Don't Give A...
Deceptive Metadata
Spear-phishing / Credential Theft
The Cat and Mouse Game Continues
Questions?