Certified: The CompTIA Security+ Audio Course

Episode 16: Deception and Disruption Technologies (Domain 1)


Listen Later

Deception technologies play a unique and powerful role in cybersecurity by proactively misleading, confusing, or delaying attackers while providing valuable insight into their methods and intentions. In this episode, we explore tools such as honeypots, which simulate vulnerable systems; honeynets, which create entire decoy network environments; and honeytokens, which are fake credentials or files designed to trigger alerts if accessed. These tools are not designed to stop attacks directly, but to detect unauthorized access attempts early and divert adversaries away from critical systems. Deception technologies also serve as intelligence-gathering platforms that help defenders learn attacker behavior, techniques, and lateral movement strategies within an environment. We discuss how to deploy deception tools safely and effectively, including considerations around isolation, monitoring, and legal risk. When implemented correctly, deception adds an invaluable layer to a defense-in-depth strategy—buying time, exposing hidden threats, and turning the tables on the attacker.

...more
View all episodesView all episodes
Download on the App Store

Certified: The CompTIA Security+ Audio CourseBy Dr. Jason Edwards

  • 5
  • 5
  • 5
  • 5
  • 5

5

3 ratings


More shows like Certified: The CompTIA Security+ Audio Course

View all
This Past Weekend w/ Theo Von by Theo Von

This Past Weekend w/ Theo Von

27,993 Listeners

Professor Messer's Security+ Study Group by Professor Messer

Professor Messer's Security+ Study Group

138 Listeners

Certified - The CompTIA A+ Audio Course by Dr. Jason Edwards

Certified - The CompTIA A+ Audio Course

2 Listeners