What you'll learn
Hands-On Honeypot Deployment
Learn to set up and manage honeypots to detect and analyze cyber threats.
Threat Behavior Analysis
Gain insights into attacker tactics, techniques, and procedures (TTPs).
Monitoring and Data Analysis
Capture and analyze live attack data in real time.
Curriculum
-
1
PART 1
-
(Included in full purchase)
FTP Honeypot
-
(Included in full purchase)
-
2
Part 2
-
(Included in full purchase)
SSH Honeypot
-
(Included in full purchase)
-
3
Part 3
-
(Included in full purchase)
Dark Market Honeypot
-
(Included in full purchase)
-
4
Part 4
-
(Included in full purchase)
Database Honeypot
-
(Included in full purchase)
-
5
Part 5
-
(Included in full purchase)
Web Honeypot
-
(Included in full purchase)
Web Honeypot GitHub
-
(Included in full purchase)
-
6
Assessment
-
(Included in full purchase)
Quiz 1
-
(Included in full purchase)