Reverse Deception: Organized Cyber Threat Counter-Exploitation
Table of Contents

Interested in seeing the entire table of contents?

Program Details

Ch 1. Introduction
Ch 2. Deception Throughout History to Today
Ch 3. The Applications & Goals of Cyber Counterintelligence
Ch 4. The Missions and Outcomes of Criminal Profiling
Ch 5. Legal & Ethical Aspects of Deception
Ch 6. Attack Tradecraft
Ch 7. Operational Deception
Ch 8. Tools, Tactics & Procedures
Ch 9. Attack Attribution
Ch 10. Black Hat Motivators
Ch 11. Understanding Advanced Persistent Threats
Ch 12. When To & When Not To Act
Ch 13. Implementation & Validation Tactics