Today’s advanced persistent threats (APTs) are increasingly sophisticated, varied, targeted, aggressive and successful. There is an increasing deployment of and dependence on Internet of Things (IoT) for remote access devices to National Critical Infrastructure Sectors and Services (NCISS). Inadequate deployment and maintenance of security on these systems could provide opportunities for attackers to harm to the American citizenry through NCISS infrastructure and associated resource disruption.
Using interactive simulations to enhance students’ understanding of complex attack paths and countermeasures for various advanced persistent threats, including ransomware and Stuxnet, this web-based course provides an overview of similarities and differences between traditional systems attacks and APT attacks. At the end of this course, participants should possess a fundamental understanding of the most common attack path for various advanced persistent threats (APTs). The course covers (a) the cyber kill chain model; (b) APT cases and attack techniques and tools; and (c) common APT defense strategies.
Objectives
- Describe APT characteristics and APT attack phases.
- Identify and define the processes and tools used by an APT attacker.
- Discuss the cyber kill chain process and it was used in different industries.
Target Audience
Managers, supervisors and administrative personnel that oversee IT personnel working in NCISS locations like water treatment and electrical.