Deep dive into Advance persistence threats – Hands-on


4500/ + taxes

ends 15 Jan


5500/ + taxes

ends 30 Jan


6500/ + taxes

ends 2nd Feb


Every Organization today, face a more complex and rapidly changing threat landscape than ever before, with a wide range of threat actors to include complex and well-funded criminal enterprises.

Organizations are facing sophisticated cyber-attacks that are specifically designed to evade conventional security controls. Examples of such attacks may include custom malware, embedded in credible looking documents, exploiting unknown vulnerabilities. Objectives could include data egress, manipulating the integrity of customer communications, and/or encryption of necessary files – for either financial gain or to carry out political motives.

It is critical to have a robust tools and technologies for dealing with targeted attacks and unknown malware, capable of protecting against advanced threat actors exploiting zero day vulnerabilities.

This hands-on training introduces you to detection and prevention of advanced zero day attacks at network and endpoint level. Network protection doesn’t cover all attack vectors. There are some solutions that are best utilized at the endpoint level and can supply additional layers of protections to users and organizations.

This is a unique course which offers security professionals, a comprehensive understanding of the complete Anti-APT and Endpoint Detection & Response technology .The extensive hands-on labs enable attendees to gain better understanding of subject.

The training provides practical guidance and attendees should walk away with the following skills:

  • Understanding Traditional threats vs advanced threats
  • Understanding vectors and techniques used to bypass traditional security products.
  • Understanding history of APT’s
  • Understanding Cyber kill chain and APT life cycle
  • Evolution of Sandboxing solutions
  • Deployment and configuration of Sandboxing
  • Understanding on Engines used by Anti-APT technology for static and Dynamic analysis
  • Zero day attack detection and prevention for attachments coming through email and Web traffic.
  • Proactive file scrubbing of malicious active content to deliver sanitized files to users in real time
  • Anti-Phishing to protect users from identity theft
  • C&C evaluation and protection against them
  • Rise of PowerShell and crypto mining based attacks and their prevention using behavioral heuristics capabilities
  • Utilizing signatures less technology to block attacks at exploit level.
  • Understanding unknown and evasive ransomware and protection against them
  • How to automate Incident response using forensics.
This course is intended for

Network Security experts, incident responders, cyber-security investigators and for curious security professionals who would like to expand their skills


  • Good knowledge of network security concepts
  • Hand-On knowledge on any industry standard firewall

What attendees should bring

  • Laptop with minimum 8 GB RAM and 60GB free hard disk space
  • Laptop with USB ports – lab samples, and custom L VM will be shared via USB sticks
  • VMware Workstation
  • Administrative privileges on the system
  • Virtualization (Vx-t) option enabled in the BIOS settings
Note: VMware player or Virtual Box is not suitable for this training.

What attendees will be provided with

  • Troika Welcome Kit
  • Course material (hard copy )
  • LAB solution material ( hard copy)
  • Videos used in course
  • Malware samples used in labs
  • VM images used in labs
  • Participation certificate from Troika Systems

Terms and Conditions

  • When registering, you explicitly agree to our Terms and Conditions, which may be modified by us from time to time and available here.
  • All rates are exclusive of taxes.
  • 100% advance payment for registration.
  • Troika reserves the right to cancel the training in case of less no. of registrations, Troika will inform the attendees at least10 days before the actual training date in that case.
  • Troika training venue may be different from the office location venue and the training attendees will be notified about the venue details almost two weeks prior to the training dates.