starweaver-logo
LOG INGET STARTED
LOG INGET STARTED
  • Browse
  • Doing

  • On Air
  • Channels
  • Career Paths
  • LEARNING

  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • CONNECTING

  • How It Works
  • Community
  • Techbytes
  • Podcasts
  • Leaderboards
  • SUPPORT

  • Support & FAQs
  • Starweaver for Business
  • Starweaver for Campus
  • Teach with Starweaver
footer-brand-logo
  • COMPANY
  • About Us
  • Support and Knowledge Base
  • Policies & Terms
  • Contact
  • CONTENT
  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • Meet the Gurus
  • Techbytes
  • FOR ORGANIZATIONS
  • Starweaver for Business
  • Starweaver for Campus
  • Catalogue
  • Pricing
  • Private Classes
  • PARTNER WITH US
  • Instructors & Teachers
  • Books, Writing & Publishing
  • FOLLOW US
    • facebook
    • twitter
    • linkedin
    • pinterest
    • instagram
    • youtube
Our trademarks include Starweaver®, Make genius happen™, Education you can bank on®, People are your most important assets!®, Body of Knowledge™, StarLabs™, LiveLabs™, Journeys™
© Starweaver Group, Inc. All Rights Reserved.
  1. Courses
  2. >
  3. Deception as a Defense

Deception as a Defense

This comprehensive course, "Defense and Deception" equips learners with critical skills to navigate the complex cybersecurity landscape.

Kevin Cardwell
Kevin Cardwell
Cybersecurity | core | 9 hours |   Published: Jun 2024
In partnership with: Coursera

    Discussions

Overview

1KSTUDENTS*
92.6%RECOMMEND*

This course includes:

  • On-demand videos
  • Practice assessments
  • Multiple hands-on learning activities
  • Exposure to a real-world project
  • 100% self-paced learning opportunities
  • Certification of completion

In this course, defensive concepts will be explored and the power of using deception at different layers of the network. The attacker depends on information that is gathered during their surveillance, and with deception we change the network at layer 2-4 and the result of this is the attacker’s collected data is no longer valid and useless for them, this requires the attacker to start the information gathering process over again. In a robust defensive solution, the network can change multiple times based on the classification of the threat, and each time it changes, the attacker is lost and has to start the recon process over again. These concepts change the game and puts the defender in control! The concepts have been deployed at Capture the Flag events and frustrated and confused the hackers for hours!

Skills You Will Gain

Cyber Security
Deception Defense
Information Gathering
Network Protocols
Threat Classification

Learning Outcomes (At The End Of This Program, You Will Be Able To...)

  • Identify and analyze cybersecurity threats and vulnerabilities. 
  • Design and implement strategic defense mechanisms. 
  • Employ advanced deception techniques to safeguard networks. 
  • Evaluate and apply cybersecurity frameworks and best practices. 
  • Operate cutting-edge security technologies and tools. 

Prerequisites

  • Basic understanding of IT and cybersecurity concepts. 
  • Familiarity with network architecture and operations. 

Who Should Attend

  • IT professionals seeking advanced cybersecurity skills. 
  • Network administrators and security analysts. 
  • Individuals aspiring to specialize in cybersecurity defense strategies. 

Curriculum

Instructors

*Where courses have been offered multiple times, the “# Students” includes all students who have enrolled. The “%Recommended” shown is also based on this data.
1Module 1: The Cybersecurity Landscape: Understanding Threats and Vulnerabilities
2Module 2: Strategic Defense: Principles of Effective Cybersecurity
3Module 3: Advanced Cybersecurity Strategies: Safeguarding Networks and Mitigating Threats
4Module 4: Network Filtering and Segmentation Best Practices
5Module 5: Deploying Deception Techniques in Network Security

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 18 - Proactive vulnerability tracking and patch management

Segment 19 - Reducing attack surface and best practices in network security

Segment 20 - Network mines and deception in cybersecurity

Segment 21 - Vulnerability management and router security

Segment 22 - Enhancing cybersecurity through perimeter configuration and filtering part 1

Segment 23 - Enhancing cybersecurity through perimeter configuration and filtering part 2

Segment 24 - Enhancing cybersecurity through perimeter configuration and filtering part 3

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 01 - Introduction to instructor

Segment 02 - Critical analysis of patch management and cybersecurity challenges - part 1

Segment 03 - Critical analysis of patch management and cybersecurity challenges - part 2

Segment 04 - XCCDF and OVAL standards for configuration management and vulnerability assessment

Segment 05 - Continuous monitoring and prioritization of vulnerabilities

Segment 06 - Decoding cybersecurity expenditure: Critical examination of strategies and failures

Segment 07 - Perimeter configuration and filtering: safeguarding the digital fortress

Segment 08 - Flipping the model: Taking control of your network

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 09 - Perimeter configuration and filtering: Safeguarding the digital fortress

Segment 10 - Deception as a defense: Rethinking security paradigms part 1

Segment 11 - Deception as a defense: Rethinking security paradigms part 2

Segment 12 - Flipping the model: Taking control of your network

Segment 13 - Weaknesses or flaws in products

Segment 14 - A case study on a critical flaw

Segment 15 - Discuss XCCDF and OVA

Segment 16 - Methodology for vulnerability tracking and monitoring part 1

Segment 17 - Methodology for vulnerability tracking and monitoring part 2

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 25 - Implementing defense measures in cybersecurity events

Segment 26 - Fundamentals of network filtering and segmentation

Segment 27 - Benefits and challenges of network segmentation

Segment 28 - Internal honeypots, sinkholes, and blackholes in network security

Segment 29 - Best practices for implementing network security measures

Segment 30 - Deception techniques in network security

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 31 - Understanding deception techniques in cybersecurity

Segment 32 - Labyrinth tool: Creating ghost IP addresses for deception

Segment 33 - Leveraging ghost IP addresses for threat identification

Segment 34 - Blackholes and decoys: Countermeasures

Segment 35 - Layer 3 and Layer 4 decoys: Diversion and intelligence gathering

Segment 36 - Decoy segments and deception strategies

Segment 37 - Conclusion

Kevin Cardwell

Kevin Cardwell

Kevin Cardwell is a cybersecurity expert with extensive experience working with banks and financial institutions across the Middle East, Europe, and the UK. A former leader of a U.S. Department of Defense Red Team, he achieved an impressive 100% success rate in system compromise operations, demonstrating unparalleled expertise in identifying and exploiting vulnerabilities. Kevin has led high-impact consulting projects, including engagements with Petroleum Development Oman and the Central Bank of Oman. His work includes the design and implementation of customized security baselines for high-profile clients such as Oman Airport Management Company (OAMC), ensuring resilient protection for critical infrastructure. He is the author of several acclaimed cybersecurity courses and publications, including Building Virtual Pentesting Labs for Advanced Penetration Testing and Advanced Penetration Testing for Highly Secured Environments, 2nd Edition. His areas of specialization include advanced penetration testing, network defense, and security architecture. As President of Cyber2Labs and Lead Consultant at CESI, Kevin continues to shape the cybersecurity landscape, helping organizations build strong digital defenses against emerging threats. He holds certifications such as Certified Advanced Network Defender and Certified Advanced Penetration Tester, underscoring his commitment to excellence in information security. In addition to his hands-on expertise, Kevin is a passionate educator and instructor, dedicated to equipping learners with the knowledge and practical skills necessary to navigate the complex world of cybersecurity with confidence. He actively promotes cutting-edge cybersecurity practices and is a trusted voice in the field for both professionals and organizations.
VIEW MY CHANNEL