TrainACE’s Cyber Threat Counter Exploitation training course will use tested security techniques and real-world case studies to teach students how to expose, pursue, and prosecute the perpetrators of APTs (advanced persistent threats). Students will develop a sense of how to assess a network’s vulnerabilities, zero in on specific targets, and block intruders in an effective manner. Students will also learn how to set up digital traps, misdirect and divert attackers, configure honeypots, mitigate encrypted crimeware, and identify malicious software groups. This course will also go over legal and ethical issues, operational vetting, and security team management to fully round out the training.

TrainACE offers Cyber Threat Counter Exploitation training in Greenbelt, MD, Ashburn, VA and Fort Meade, MD

Classroom-Based Training Cost: $2,495 Per Enrollment

Price Includes:

  • Instructor-led training
  • Hands-on labs
  • Training manual
  • Course retake option

Training Schedule

All Times Listed in Eastern Standard Time (EST)

For information related to scheduling, please fill out the information request form to the left.

Custom Training for Your Organization

Is a Custom Class Right?? Not sure. Tell us about your training needs, your ideal start-date, your location preference, your unique set of challenges and the expected outcome, and we will develop a customized training course proposal targeted to the specific needs of your staff within your scheduling constraints! We will gladly do this quickly and free of any obligation.

Custom Computer Training Inquiry Form
 

This course falls under our price & quality guarantee.

Topics & Concepts Covered in Cyber Threat Counter Exploitation Training Include:

  • State of the Advanced Cyber Threat
  • What Makes a Threat Advanced and Persistent?
  • Advanced and Persistent Threat Examples
  • How Does Deception Fit in Countering Cyber Threats?
  • 6 Principles of Deception
  • Traditional Deception
  • Why Use Deception?
  • Deception Maxims
  • Understanding the Information Picture
  • Cyber Counterintelligence
  • Fundamental Competencies
  • Applying Counterintelligence to the Cyber Realm
  • Sizing Up Advanced and Persistent Threats
  • Cyber Counterintelligence – Lab
  • Profiling Fundamentals
  • Cyber Profiling
  • Objectives of Profiling
  • Nature of Profiling
  • Basic Types of Profiling
  • Inductive and Deductive Profiling
  • Information  Vectors for Profiling
  • Profiling – Lab
  • Actionable Legal Knowledge for the Security Professional
  • How to Work with a Lawyer
  • What You Should Know About Legal Research
  • Communicating with Lawyers
  • Cyberspace Ethics
  • Threats
  • Categories of Threat
  • Eveolution of Vectors
  • Tools and Techniques of Attackers
  • Threats – Lab
  • Operational Deception
  • Insider Threat
  • Social Engineering
  • Operational Deception – Lab
  • Tools and Tactics
  • Detection Technologies
  • Host-Based Tools
  • Network-Based Tools
  • Methodologies of Cyber Crime
  • Risk Assessment – Check Yourself Before You’re Wrecked
  • Analysis Detection Systems
  • Attack Characterization
  • Post-Incident Characterization
  • Real-World Tactics
  • Attack Attribution
  • Profiling Vectors
  • Strategic Application of Profiling Techniques
  • Micro and Macro Level Analysis
  • The Value of APTs
  • Espionage
  • Costs of Cyber Espionage
  • Value Network Analysis
  • When and When Not to Act
  • Determining Threat Severity
  • Incident Reporting
  • Cyber Threat Acquisition
  • Implementation and Validation

Recommended Cyber Threat Counter Exploitation Training Audience & Prerequisites

Our hands-on Cyber Threat Counter Exploitation certification training class is appropriate for:

  • Incident response team members
  • Digital forensic analysts
  • Information security professionals
  • Law enforcement officers and federal agents
  • Government and military workers who need to meet IA training requirements