Cyber deception tools (honeypots, honeynets, canary tokens, etc.) are cyber security tools used to lure and capture cyber attackers. They are often used to detect cyber threats and gather information about attackers’ attempts to break into protected systems. Often configured as systems that appear to provide access to certain data or systems, but actually record the attacker's activity and transmit it for analysis. They can be used in conjunction with other cyber security measures to protect against cyber threats.

Skills acquired by completing the course:

  • An understanding of cyber deception tools (Honeypots)
  • The ability to implement, configure, and monitor a Honeypot
  • The ability to use Canary Tokens

Meet your trainer

Gabriel Puiu

Trainer

Gabriel is a Cyber Security Consultant with over 6 years of experience in Penetration Testing, OSINT, Cyber Intelligence, Security Operations and Training. The founder of Zamolxis Solutions, a software & cyber security company and the president of the Hackout.ro Organization. Involved in several cyber education projects aimed at increasing awareness of cyber security dangers.

Course curriculum

    1. THEORETICAL MODULE: Introduction to Cyber Deception

    2. PRACTICAL MODULE: Implementing and Configuring a Honeypot

    3. PRACTICAL MODULE: Monitoring a Honeypot

    1. PRACTICAL MODULE: Recognizing Honeypots Exposed to the Internet

    2. PRACTICAL MODULE: Canary Tokens

About this course

  • 470 lei (or aprox. 96 EUR)
  • 2 Days /2 sessions
  • online, real-time trainer
    Level: Beginner

Enroll today to Understanding and Implementing Cyber Deception