Overview
This course focuses on teaching participants about Deceptive Ops and Honeynet Design. The learning outcomes include understanding cyber threat intelligence, different types of threat intelligence feeds, network telescopes, honeynet interactions, and protecting assets. Participants will develop skills in threat intelligence trends. The teaching method involves hands-on talks and practical examples. This course is intended for decision-makers, security specialists, entrepreneurs, developers, and anyone interested in information security and hacking practices.
Syllabus
Intro
Business Internet Security Report
Deceptive Ops Challenge
Cyber Threat Intelligence
Types of Cyber Threat Intelligence
Quality of Threat Intelligence Feed
Network Telescope
Honeynet Interactions
Understanding Attackers
Protecting Assets
Honeypots
Skills required
Threat intelligence trends
Taught by
DefCamp