About the Course

This course will cover the basics of Deception and Decoy technologies, deployment and alert primitives. You will learn to construct the basics for decoy documents, files as well as network services. We'll discuss topics like valuable vs vulnerable, how many, where, and should a decoy blend in or stand out? We break down attack patterns to understand and develop custom decoy solutions. We also learn to spot decoys and take evasive action as an offensive security researcher.

About the Instructor 

Casey (@subtee.bsky.social) brings over two decades of cybersecurity expertise spanning offensive security, defensive research, and security education. As a former Researcher at Thinkst Applied Research, he helped develop innovative deception technologies including Canarytokens for EntraID adversary-in-the-middle detection, Sensitive Command Token, Windows Fake File System using ProjFS. Casey has spearheaded adversary emulation efforts and served as co- creator for the widely-adopted Atomic Red Team project. His deep understanding of attacker methodologies, combined with his expertise in real world network scenarios, provides a unique perspective on how deception can disrupt adversarial operations. His specialization in deception technologies, offensive security research, and practical defense implementation makes him uniquely qualified to teach the art and science of security through deception.

Don't miss a chance to detect someone in your network.

Cyber Deception By Design - Practitioner