Course curriculum

    1. Segment 00: Intro Video to Course

    2. Segment 01: Defining Cyber Espionage

    3. Segment 02: APTs Stealth and Persistence

    4. Segment 03: Threat Actor Classification

    1. Segment 04: State vs Non-State Actors

    2. Segment 05: Financial Political Strategic Drivers

    3. Segment 06: Threat Profiling Demonstration

    1. Segment 07: Evolution of Cyber Espionage

    2. Segment 08: Major Global Incidents

    3. Segment 09: Lessons Learned Patterns

    4. Segment 10: Reading - Advanced Persistent Threat: A Deep Dive into Cyber Espionage

    5. Segment 11: Hands-On-Learning: Profiling a Threat Actor

    1. Segment 13: Exfiltration Channels _ Techniques

    2. Segment 14: Obfuscation Methods (Steganography_ Encryption)

    3. Segment 15: Demo – Simulated Data Theft Using Tools

    1. Segment 16: Payload Delivery Techniques

    2. Segment 17: Lateral Movement via Credential Dumping

    3. Segment 18: Demo – Malware Deployment Walkthrough

    1. Segment 19: Passive vs Active Reconnaissance 

    2. Segment 20: Exploitation Techniques _ Vulnerabilities

    3. Segment 21: Social Engineering SimulationDemo- Nmap Active Reconnaissance

    4. Segment 22: Reading - Inter-Sector Technical Cybersecurity Challenges Report

    5. Segment 23: Hands-On-Learning: Simulating Reconnaissance and Social Engineering Attack

About this course

  • Free
  • 47 lessons
  • 5.5 hours of video content

Discover your potential, starting today