Preferred method of contact:

Advanced Persistent Threats: Targeted Attacks & Defenses



Course Number



4 Days

PDF Add to WishList

To prevent a cyber attack from accessing sensitive data, organizations need to develop effective mitigation plans and countermeasures. In this training course, you gain the skills to identify comprehensive attacks, leverage defense methodologies, mitigate the risk of targeted attacks and cyber espionage, and assess inherent vulnerabilities that expose your organization to advanced persistent threats.

You Will Learn How To

  • Proactively identify organizational weaknesses in order to mitigate the risk of Advanced Persistent Threats (APTs) and targeted attacks
  • Assess and defend against the risk of cyber espionage
  • Identify attack vectors and methods used by sophisticated attackers
  • Expose and prevent the unauthorized exfiltration of critical organizational data

Important Course Information


  • Working knowledge of vulnerabilities and exploits, and social engineering

Recommended Experience:

  • Experience at the level of:
    • Course 537, Penetration Testing: Tools & Techniques
    • Course 2010, Defending the Perimeter from Cyber Attacks
    • Course 2011, Endpoint Security & Network Access Control
    • Course 2012, Targeted Human Threats: Social Engineering Deceptions, Exploits & Defenses
    • Course 2055, Digital Forensics Tools & Techniques

Course Outline

  • Introduction
  • Defining the Advanced Persistent Threat (APT)
  • Reviewing the history of targeted attacks
  • Identifying the threat actors
  • Investigating case studies
  • Assessing the components of an APT attack
  • Performing Initial Reconnaissance

Conducting passive recon

  • Leveraging Google Hacking and Maltego
  • Harvesting useful information

Executing technical probes

  • Mapping the DMZ infrastructure and application architecture
  • Assesing vulnerabilities in the security posture

Deploying defenses against information leaks

  • Implementing shunning and dropping routes
  • Protecting unclassified information through good OPSEC practices
  • Exploring the "Initial Compromise"

Executing technical vulnerabilities

  • Performing advanced SQL injection and cross-site scripting
  • Hijacking sessions and privileged processes

Exploiting human weaknesses

  • Devising USB/portable media attacks
  • Creating and delivering effective payloads

Defending against exfiltration and remote attacks

  • Deploying data loss prevention agents
  • Mitigating web application attacks
  • Developing Internal Systems Intelligence

Evaluating private subnets

  • Utilizing the Metasploit auxiliary modules
  • Exposing internal attack vectors

Enumerating critical assets

  • Identifying addresses, services and device types
  • Investigating SCADA weaknesses

Detecting rogue activity

  • Locating promiscuous nodes
  • Analyzing suspicious traffic
  • Pivoting to New Targets

Routing attack sessions

  • Identifying prerequisites for pivoting
  • Comparing and contrasting lateral attack techniques

Rooting new victims

  • Selecting an attack vector
  • Establishing covert communications

Proactively identifying vulnerabilities

  • Conducting a scan for vulnerabilities
  • Evaluating traffic and protocol anomalies
  • Exploiting Assets

Escalating privileges

  • Bypassing User Account Control (UAC)
  • Rooting with process migration

Conducting anti-forensics

  • Performing "timestomping"
  • Covering your tracks with log tampering and slack wiping

Mitigating exploitation and abuse

  • Defending against process migration and escalation
  • Monitoring and verifying file system integrity
  • Exfiltrating Confidential Information

Searching for valuable data

  • Finding high-value information
  • Locating linked resources

Discovering various exfiltration methods

  • Preparing data to be stolen
  • Selecting a tunneling method

Implementing exfiltration defenses

  • Deploying and testing data loss prevention
  • Performing log and traffic analysis
  • Creating a Defensive Plan
  • Establishing a secure baseline
  • Whitelisting applications
  • Implementing continuous diagnostics and remediation
  • Employing digital forensics to discover threats
  • Deploying internal honeypots
  • Enumerating a security checklist
Show complete outline
Show Less

Convenient Ways to Attend This Instructor-Led Course

Hassle-Free Enrollment: No advance payment required to reserve your seat.
Tuition due 30 days after you attend your course.

In the Classroom

Live, Online

Private Team Training

In the Classroom — OR — Live, Online

Tuition — Standard: $2990   Government: $2659

Dec 19 - 22 (4 Days)
9:00 AM - 4:30 PM EST
New York / Online (AnyWare) New York / Online (AnyWare) Reserve Your Seat

How would you like to attend?

Live, Online

Feb 6 - 9 (4 Days)
9:00 AM - 4:30 PM EST
Alexandria, VA / Online (AnyWare) Alexandria, VA / Online (AnyWare) Reserve Your Seat

How would you like to attend?

Live, Online

Apr 3 - 6 (4 Days)
9:00 AM - 4:30 PM EDT
Rockville, MD / Online (AnyWare) Rockville, MD / Online (AnyWare) Reserve Your Seat

How would you like to attend?

Live, Online

Jun 19 - 22 (4 Days)
9:00 AM - 4:30 PM EDT
New York / Online (AnyWare) New York / Online (AnyWare) Reserve Your Seat

How would you like to attend?

Live, Online

Aug 7 - 10 (4 Days)
9:00 AM - 4:30 PM EDT
Alexandria, VA / Online (AnyWare) Alexandria, VA / Online (AnyWare) Reserve Your Seat

How would you like to attend?

Live, Online

Oct 2 - 5 (4 Days)
9:00 AM - 4:30 PM EDT
Rockville, MD / Online (AnyWare) Rockville, MD / Online (AnyWare) Reserve Your Seat

How would you like to attend?

Live, Online

Guaranteed to Run

Private Team Training

Enrolling at least 3 people in this course? Consider bringing this (or any course that can be custom designed) to your preferred location as a private team training.

For details, call 1-888-843-8733 or Click Here »




In Classroom or





Private Team Training

Contact Us »

Course Tuition Includes:

After-Course Instructor Coaching
When you return to work, you are entitled to schedule a free coaching session with your instructor for help and guidance as you apply your new skills.

Free Course Exam
You can take your Learning Tree course exam on the last day of your course or online at any time after class and receive a Certificate of Achievement with the designation "Awarded with Distinction."


Training Hours

Standard Course Hours: 9:00 am – 4:30 pm
*Informal discussion with instructor about your projects or areas of special interest: 4:30 pm – 5:30 pm

FREE Online Course Exam (if applicable) – Last Day: 3:30 pm – 4:30 pm
By successfully completing your FREE online course exam, you will:

  • Have a record of your growth and learning results.
  • Bring proof of your progress back to your organization
  • Earn credits toward industry certifications (if applicable)

Enhance Your Credentials with Professional Certification

Learning Tree's comprehensive training and exam preparation guarantees that you will gain the knowledge and confidence to achieve professional certification and advance your career.

This course is approved by CompTIA for continuing education units (CEUs). For additional information and to confirm which courses are eligible towards your CompTIA certification, click here.

Earn 17 Credits from NASBA

This course qualifies for 17 CPE credits from the National Association of State Boards of Accountancy CPE program. Read more ...

- ,

Chat Now

Please Choose a Language

Canada - English

Canada - Français