Advanced Persistent Threats Training: Targeted Attack Protection

Level: Advanced
Rating: 4.7/5 4.71/5 Based on 80 Reviews

In this Advanced Persistent Threat (APT) training course you will learn to develop effective mitigation plans and countermeasures to prevent cyber attacks from accessing your sensitive data. You will learn how to prevent advanced persistent threats by gaining the skills to identify comprehensive attacks, leverage defence methodologies, and mitigate the risk of targeted attacks and cyber espionage. Learn to assess inherent vulnerabilities that expose your organization to advanced persistent threats.

Key Features of this Advanced Persistent Threat (APT) Training:

  • After-course instructor coaching benefit
  • Learning Tree end-of-course exam included

You Will Learn How To:

  • Proactively identify organizational weaknesses in order to mitigate the risk of Advanced Persistent Threats (APTs) and targeted attacks
  • Assess and defend against the risk of cyber espionage
  • Identify attack vectors and methods used by sophisticated attackers
  • Expose and prevent the unauthorized exfiltration of critical organizational data



Choose the Training Solution That Best Fits Your Individual Needs or Organizational Goals


In Class & Live, Online Training

  • 4-day instructor-led training course
  • One-on-one after course instructor coaching
  • Earn 23 CompTIA CEUs
  • Pay later by invoice -OR- at the time of checkout by credit card
View Course Details & Schedule

Standard $3285

Government $2890




Team Training

  • Bring this or any training to your organization
  • Full - scale program development
  • Delivered when, where, and how you want it
  • Blended learning models
  • Tailored content
  • Expert team coaching

Customize Your Team Training Experience


Save More On Training with FlexVouchers – A Unique Training Savings Account

Our FlexVouchers help you lock in your training budgets without having to commit to a traditional 1 voucher = 1 course classroom-only attendance. FlexVouchers expand your purchasing power to modern blended solutions and services that are completely customizable. For details, please call 888-843-8733 or chat live.

In Class & Live, Online Training

  • May 21 - 24 ( 4 Days)
    9:00 AM - 4:30 PM EDT
    New York / Online (AnyWare) New York / Online (AnyWare) Reserve Your Seat

  • Jul 16 - 19 ( 4 Days)
    9:00 AM - 4:30 PM EDT
    Rockville, MD / Online (AnyWare) Rockville, MD / Online (AnyWare) Reserve Your Seat

  • Nov 12 - 15 ( 4 Days)
    9:00 AM - 4:30 PM EST
    New York / Online (AnyWare) New York / Online (AnyWare) Reserve Your Seat

  • Jan 14 - 17 ( 4 Days)
    9:00 AM - 4:30 PM EST
    Rockville, MD / Online (AnyWare) Rockville, MD / Online (AnyWare) Reserve Your Seat

Guaranteed to Run

When you see the "Guaranteed to Run" icon next to a course event, you can rest assured that your course event — date, time, location — will run. Guaranteed.

Advanced Persistent Threat Course Outline

  • Introduction

    • Defining the Advanced Persistent Threat (APT)
    • Reviewing the history of targeted attacks
    • Identifying the threat actors
    • Investigating case studies
    • Assessing the components of an APT attack
  • Performing Initial Reconnaissance

    Conducting passive recon

    • Leveraging Google Hacking and Maltego
    • Harvesting useful information

    Executing technical probes

    • Mapping the DMZ infrastructure and application architecture
    • Assesing vulnerabilities in the security posture

    Deploying defences against information leaks

    • Implementing shunning and dropping routes
    • Protecting unclassified information through good OPSEC practices
  • Exploring the "Initial Compromise"

    Executing technical vulnerabilities

    • Performing advanced SQL injection and cross-site scripting
    • Hijacking sessions and privileged processes

    Exploiting human weaknesses

    • Devising USB/portable media attacks
    • Creating and delivering effective payloads

    Defending against exfiltration and remote attacks

    • Deploying data loss prevention agents
    • Mitigating web application attacks
  • Developing Internal Systems Intelligence

    Evaluating private subnets

    • Utilizing the Metasploit auxiliary modules
    • Exposing internal attack vectors

    Enumerating critical assets

    • Identifying addresses, services and device types
    • Investigating SCADA weaknesses

    Detecting rogue activity

    • Locating promiscuous nodes
    • Analyzing suspicious traffic
  • Pivoting to New Targets

    Routing attack sessions

    • Identifying prerequisites for pivoting
    • Comparing and contrasting lateral attack techniques

    Rooting new victims

    • Selecting an attack vector
    • Establishing covert communications

    Proactively identifying vulnerabilities

    • Conducting a scan for vulnerabilities
    • Evaluating traffic and protocol anomalies
  • Exploiting Assets

    Escalating privileges

    • Bypassing User Account Control (UAC)
    • Rooting with process migration

    Conducting anti-forensics

    • Performing "timestomping"
    • Covering your tracks with log tampering and slack wiping

    Mitigating exploitation and abuse

    • Defending against process migration and escalation
    • Monitoring and verifying file system integrity
  • Exfiltrating Confidential Information

    Searching for valuable data

    • Finding high-value information
    • Locating linked resources

    Discovering various exfiltration methods

    • Preparing data to be stolen
    • Selecting a tunneling method

    Implementing exfiltration defences

    • Deploying and testing data loss prevention
    • Performing log and traffic analysis
  • Creating a Defensive Plan

    • Establishing a secure baseline
    • Whitelisting applications
    • Implementing continuous diagnostics and remediation
    • Employing digital forensics to discover threats
    • Deploying internal honeypots
    • Enumerating a security checklist

Team Training

Advanced Persistent Threat Training FAQs

  • What is an advanced persistent threat?

    APT is a cyber attack that is targeted and prolonged. It usually contains a set of stealthy and continous hacking, often targeting a specific entity. 

  • What is advanced threat protection?

    ATP is a security solution that is cloud-based, its purpose is to identity, detect and investigate advanced threats.

  • Can I learn advanced threat protection online?

    Yes! We know your busy work schedule may prevent you from getting to one of our classrooms which is why we offer convenient online training to meet your needs wherever you want. This course is available in class and live online.

Questions about which training is right for you?

call 888-843-8733
chat Live Chat

100% Satisfaction Guaranteed

Your Training Comes with a 100% Satisfaction Guarantee!*

  • If you are not 100 % satisfied, you pay no tuition!
  • No advance payment required for most products.
  • Tuition can be paid later by invoice - OR - at the time of checkout by credit card.

*Partner-delivered courses may have different terms that apply. Ask for details.

New York / Online (AnyWare)
Rockville, MD / Online (AnyWare)
New York / Online (AnyWare)
Rockville, MD / Online (AnyWare)
Preferred method of contact:
Chat Now

Please Choose a Language

Canada - English

Canada - Français