

Deception As a Defense
- Offered byCoursera
- Public/Government Institute
Deception As a Defense at Coursera Overview
Duration | 5 hours |
Mode of learning | Online |
Official Website | Go to Website |
Credential | Certificate |
Deception As a Defense at Coursera Highlights
- Earn a certificate from Coursera
- Add to your LinkedIn profile
- 2 assignments
Deception As a Defense at Coursera Course details
- In this course, defensive concepts will be explored and the power of using deception at different layers of the network
- The attacker depends on information that is gathered during their surveillance, and with deception we change the network at layer 2-4 and the result of this is the attacker's collected data is no longer valid and useless for them, this requires the attacker to start the information gathering process over again
- In a robust defensive solution, the network can change multiple times based on the classification of the threat, and each time it changes, the attacker is lost and has to start the recon process over again
- These concepts change the game and puts the defender in control! The concepts have been deployed at Capture the Flag events and frustrated and confused the hackers for hours!
- Forever you have heard that the hackers are in control and they only need to find one way in
- This course will show you how to flip that model and we only need one packet to identify the attacker and prepare our response strategy
Deception As a Defense at Coursera Curriculum
Foundations of Cybersecurity and Strategic Defenses
Introduction to instructor
Critical analysis of patch management and cybersecurity challenges part 1
Critical analysis of patch management and cybersecurity challenges part 2
XCCDF and OVAL standards for configuration management and vulnerability assessment
Continuous monitoring and prioritization of vulnerabilities
Decoding cybersecurity expenditure: Critical examination of strategies and failures
Perimeter configuration and filtering: safeguarding the digital fortress
Deception as a defense: Rethinking security paradigms
Flipping the model: Taking control of your network
Perimeter configuration and filtering: Safeguarding the digital fortress
Deception as a defense: Rethinking security paradigms part 1
Deception as a defense: Rethinking security paradigms part 2
Flipping the model: Taking control of your network
Weaknesses or flaws in products
A case study on a critical flaw
Discuss XCCDF and OVA
Methodology for vulnerability tracking and monitoring part 1
Methodology for vulnerability tracking and monitoring part 2
Welcome to the course
Rethinking patch-first approach: Effective strategies focybersecurity
The illusion of perfect security: A deep dive
Foundations of cybersecurity and strategic defenses
Discussion on leveraging CVSS in tailored vulnerability management strategies.
Advanced Cybersecurity Strategies and Network Defense Techniques
Proactive vulnerability tracking and patch management
Reducing attack surface and best practices in network security
Network mines and deception in cybersecurity
Vulnerability management and router security
Enhancing cybersecurity through perimeter configuration and filtering part 1
Enhancing cybersecurity through perimeter configuration and filtering part 2
Enhancing cybersecurity through perimeter configuration and filtering part 3
Implementing defense measures in cybersecurity events
Fundamentals of network filtering and segmentation
Benefits and challenges of network segmentation
Internal honeypots, sinkholes, and blackholes in network security
Best practices for implementing network security measures
Deception techniques in network security
Understanding deception techniques in cybersecurity
Labyrinth tool: Creating ghost IP addresses for deception
Leveraging ghost IP addresses for threat identification
Blackholes and decoys: Countermeasures
Layer 3 and Layer 4 decoys: Diversion and intelligence gathering
Decoy segments and deception strategies
Conclusion
Reflecting on 20 years of patch tuesday
Vulnerability management: Complete guide to process and tools
A practical guide to attack surface management
Advanced cybersecurity strategies and network defense techniques
Discussion on the role of ingress and egress filtering in network security.