Coursera
Coursera Logo

Deception As a Defense 

  • Offered byCoursera
  • Public/Government Institute

Deception As a Defense
 at 
Coursera 
Overview

Deception can deter attackers or lead them to make mistakes, ultimately reducing the risk of a successful breach

Duration

5 hours

Mode of learning

Online

Official Website

Go to Website External Link Icon

Credential

Certificate

Deception As a Defense
Table of content
Accordion Icon V3
  • Overview
  • Highlights
  • Course Details
  • Curriculum

Deception As a Defense
 at 
Coursera 
Highlights

  • Earn a certificate from Coursera
  • Add to your LinkedIn profile
  • 2 assignments
Details Icon

Deception As a Defense
 at 
Coursera 
Course details

More about this course
  • In this course, defensive concepts will be explored and the power of using deception at different layers of the network
  • The attacker depends on information that is gathered during their surveillance, and with deception we change the network at layer 2-4 and the result of this is the attacker's collected data is no longer valid and useless for them, this requires the attacker to start the information gathering process over again
  • In a robust defensive solution, the network can change multiple times based on the classification of the threat, and each time it changes, the attacker is lost and has to start the recon process over again
  • These concepts change the game and puts the defender in control! The concepts have been deployed at Capture the Flag events and frustrated and confused the hackers for hours!
  • Forever you have heard that the hackers are in control and they only need to find one way in
  • This course will show you how to flip that model and we only need one packet to identify the attacker and prepare our response strategy
Read more

Deception As a Defense
 at 
Coursera 
Curriculum

Foundations of Cybersecurity and Strategic Defenses

Introduction to instructor

Critical analysis of patch management and cybersecurity challenges part 1

Critical analysis of patch management and cybersecurity challenges part 2

XCCDF and OVAL standards for configuration management and vulnerability assessment

Continuous monitoring and prioritization of vulnerabilities

Decoding cybersecurity expenditure: Critical examination of strategies and failures

Perimeter configuration and filtering: safeguarding the digital fortress

Deception as a defense: Rethinking security paradigms

Flipping the model: Taking control of your network

Perimeter configuration and filtering: Safeguarding the digital fortress

Deception as a defense: Rethinking security paradigms part 1

Deception as a defense: Rethinking security paradigms part 2

Flipping the model: Taking control of your network

Weaknesses or flaws in products

A case study on a critical flaw

Discuss XCCDF and OVA

Methodology for vulnerability tracking and monitoring part 1

Methodology for vulnerability tracking and monitoring part 2

Welcome to the course

Rethinking patch-first approach: Effective strategies focybersecurity

The illusion of perfect security: A deep dive

Foundations of cybersecurity and strategic defenses

Discussion on leveraging CVSS in tailored vulnerability management strategies.

Advanced Cybersecurity Strategies and Network Defense Techniques

Proactive vulnerability tracking and patch management

Reducing attack surface and best practices in network security

Network mines and deception in cybersecurity

Vulnerability management and router security

Enhancing cybersecurity through perimeter configuration and filtering part 1

Enhancing cybersecurity through perimeter configuration and filtering part 2

Enhancing cybersecurity through perimeter configuration and filtering part 3

Implementing defense measures in cybersecurity events

Fundamentals of network filtering and segmentation

Benefits and challenges of network segmentation

Internal honeypots, sinkholes, and blackholes in network security

Best practices for implementing network security measures

Deception techniques in network security

Understanding deception techniques in cybersecurity

Labyrinth tool: Creating ghost IP addresses for deception

Leveraging ghost IP addresses for threat identification

Blackholes and decoys: Countermeasures

Layer 3 and Layer 4 decoys: Diversion and intelligence gathering

Decoy segments and deception strategies

Conclusion

Reflecting on 20 years of patch tuesday

Vulnerability management: Complete guide to process and tools

A practical guide to attack surface management

Advanced cybersecurity strategies and network defense techniques

Discussion on the role of ingress and egress filtering in network security.

Other courses offered by Coursera

– / –
3 months
Beginner
– / –
20 hours
Beginner
– / –
2 months
Beginner
– / –
3 months
Beginner
View Other 6716 CoursesRight Arrow Icon
qna

Deception As a Defense
 at 
Coursera 

Student Forum

chatAnything you would want to ask experts?
Write here...