Information Security: APT Defenses
In this 13-video course discover key Advanced Persistent Threat (APT) concepts such as defense and best practices. Explore common APT attacks and mitigation techniques that can be used APT tools and how to create effective APT checklists. You will begin with an introduction to APT and its purpose then look at the steps of the APT lifecycle. Learners will examine motives behind an APT and probable targets and learn to identify APT defense best practices. Next you will explore methods that can be used to strengthen APT defenses and then recall the method(s) to deal with APTs. You will then take a look at the Equation aka APT group and its involvement in various cyber crimes. Another tutorial examines the key tools that are used when conducting an APT. Define risk assessment processes that can help you protect your assets. In the final tutorial in this course you will be asked to identify key points for creating an effective checklist to address APT attacks.