Advanced Persistent Threats Training: Targeted Attack Protection

Level: Advanced
RATING: 4.7/5 4.73/5 Based on 74 Reviews

In this Advanced Persistent Threat (APT) training course you will learn to develop effective mitigation plans and countermeasures to prevent cyber attacks from accessing your sensitive data. You will learn how to prevent advanced persistent threats by gaining the skills to identify comprehensive attacks, leverage defence methodologies, and mitigate the risk of targeted attacks and cyber espionage. Learn to assess inherent vulnerabilities that expose your organisation to advanced persistent threats.

Key Features of this Advanced Persistent Threat (APT) Training:

  • After-course instructor coaching benefit
  • Learning Tree end-of-course exam included

You Will Learn How To:

  • Proactively identify organisational weaknesses in order to mitigate the risk of Advanced Persistent Threats (APTs) and targeted attacks
  • Assess and defend against the risk of cyber espionage
  • Identify attack vectors and methods used by sophisticated attackers
  • Expose and prevent the unauthorised exfiltration of critical organisational data



Choose the Training Solution That Best Fits Your Individual Needs or Organisational Goals


In Class & Live, Online Training

  • 4-day instructor-led training course
  • One-on-one after course instructor coaching
  • Earn 23 CompTIA CEUs
  • Pay later by invoice -OR- at the time of checkout by credit card
View Course Details & Schedule

Standard £2095




Team Training

  • Bring this or any training to your organisation
  • Full - scale program development
  • Delivered when, where, and how you want it
  • Blended learning models
  • Tailored content
  • Expert team coaching

Customize Your Team Training Experience


Save More on Training with Learning Tree Training Vouchers!

Our flexible, easy-to-redeem training vouchers are available to any employee within your organisation. For details, please call 0800 282 353 or chat live.

In Class & Live, Online Training

  • AFTERNOON START: Attend these live courses online via Anyware

    5 - 8 Feb ( 4 Days)
    2:00 PM - 9:30 PM GMT
    Alexandria, VA / Online (AnyWare) Alexandria, VA / Online (AnyWare) Reserve Your Seat

  • 12 - 15 Mar ( 4 Days)
    1:00 PM - 8:30 PM GMT
    Rockville, MD / Online (AnyWare) Rockville, MD / Online (AnyWare) Reserve Your Seat

  • 21 - 24 May ( 4 Days)
    2:00 PM - 9:30 PM BST
    New York / Online (AnyWare) New York / Online (AnyWare) Reserve Your Seat

  • 6 - 9 Aug ( 4 Days)
    2:00 PM - 9:30 PM BST
    Alexandria, VA / Online (AnyWare) Alexandria, VA / Online (AnyWare) Reserve Your Seat

  • 12 - 15 Nov ( 4 Days)
    2:00 PM - 9:30 PM GMT
    New York / Online (AnyWare) New York / Online (AnyWare) Reserve Your Seat

Guaranteed to Run

When you see the "Guaranteed to Run" icon next to a course event, you can rest assured that your course event — date, time, location — will run. Guaranteed.

Advanced Persistent Threat Course Outline

  • Introduction

    • Defining the Advanced Persistent Threat (APT)
    • Reviewing the history of targeted attacks
    • Identifying the threat actors
    • Investigating case studies
    • Assessing the components of an APT attack
  • Performing Initial Reconnaissance

    Conducting passive recon

    • Leveraging Google Hacking and Maltego
    • Harvesting useful information

    Executing technical probes

    • Mapping the DMZ infrastructure and application architecture
    • Assesing vulnerabilities in the security posture

    Deploying defences against information leaks

    • Implementing shunning and dropping routes
    • Protecting unclassified information through good OPSEC practises
  • Exploring the "Initial Compromise"

    Executing technical vulnerabilities

    • Performing advanced SQL injection and cross-site scripting
    • Hijacking sessions and privileged processes

    Exploiting human weaknesses

    • Devising USB/portable media attacks
    • Creating and delivering effective payloads

    Defending against exfiltration and remote attacks

    • Deploying data loss prevention agents
    • Mitigating web application attacks
  • Developing Internal Systems Intelligence

    Evaluating private subnets

    • Utilising the Metasploit auxiliary modules
    • Exposing internal attack vectors

    Enumerating critical assets

    • Identifying addresses, services and device types
    • Investigating SCADA weaknesses

    Detecting rogue activity

    • Locating promiscuous nodes
    • Analysing suspicious traffic
  • Pivoting to New Targets

    Routing attack sessions

    • Identifying prerequisites for pivoting
    • Comparing and contrasting lateral attack techniques

    Rooting new victims

    • Selecting an attack vector
    • Establishing covert communications

    Proactively identifying vulnerabilities

    • Conducting a scan for vulnerabilities
    • Evaluating traffic and protocol anomalies
  • Exploiting Assets

    Escalating privileges

    • Bypassing User Account Control (UAC)
    • Rooting with process migration

    Conducting anti-forensics

    • Performing "timestomping"
    • Covering your tracks with log tampering and slack wiping

    Mitigating exploitation and abuse

    • Defending against process migration and escalation
    • Monitoring and verifying file system integrity
  • Exfiltrating Confidential Information

    Searching for valuable data

    • Finding high-value information
    • Locating linked resources

    Discovering various exfiltration methods

    • Preparing data to be stolen
    • Selecting a tunnelling method

    Implementing exfiltration defences

    • Deploying and testing data loss prevention
    • Performing log and traffic analysis
  • Creating a Defensive Plan

    • Establishing a secure baseline
    • Whitelisting applications
    • Implementing continuous diagnostics and remediation
    • Employing digital forensics to discover threats
    • Deploying internal honeypots
    • Enumerating a security checklist

Team Training

Advanced Persistent Threat Training FAQs

  • What is an advanced persistent threat?

    APT is a cyber attack that is targeted and prolonged. It usually contains a set of stealthy and continous hacking, often targeting a specific entity. 

  • What is advanced threat protection?

    ATP is a security solution that is cloud-based, its purpose is to identity, detect and investigate advanced threats.

  • Can I learn advanced threat protection online?

    Yes! We know your busy work schedule may prevent you from getting to one of our classrooms which is why we offer convenient online training to meet your needs wherever you want. This course is available in class and live online.

Questions about which training is right for you?

call 0800 282 353
chat Live Chat

100% Satisfaction Guaranteed

Your Training Comes with a 100% Satisfaction Guarantee!*

  • If you are not 100 % satisfied, you pay no tuition fee!
  • No advance payment required for most products.
  • Tuition fee can be paid later by invoice - OR - at the time of checkout by credit card.

*Partner-delivered courses may have different terms that apply. Ask for details.

Alexandria, VA / Online (AnyWare)
Rockville, MD / Online (AnyWare)
New York / Online (AnyWare)
Alexandria, VA / Online (AnyWare)
New York / Online (AnyWare)
Preferred method of contact:
Chat Now

Please Choose a Language

Canada - English

Canada - Français