DiscoverCertified: The CompTIA Security+ Audio CourseEpisode 16: Deception and Disruption Technologies (Domain 1)
Episode 16: Deception and Disruption Technologies (Domain 1)

Episode 16: Deception and Disruption Technologies (Domain 1)

Update: 2025-06-15
Share

Description

Deception technologies play a unique and powerful role in cybersecurity by proactively misleading, confusing, or delaying attackers while providing valuable insight into their methods and intentions. In this episode, we explore tools such as honeypots, which simulate vulnerable systems; honeynets, which create entire decoy network environments; and honeytokens, which are fake credentials or files designed to trigger alerts if accessed. These tools are not designed to stop attacks directly, but to detect unauthorized access attempts early and divert adversaries away from critical systems. Deception technologies also serve as intelligence-gathering platforms that help defenders learn attacker behavior, techniques, and lateral movement strategies within an environment. We discuss how to deploy deception tools safely and effectively, including considerations around isolation, monitoring, and legal risk. When implemented correctly, deception adds an invaluable layer to a defense-in-depth strategy—buying time, exposing hidden threats, and turning the tables on the attacker.

Comments 
loading
In Channel
loading
00:00
00:00
1.0x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Episode 16: Deception and Disruption Technologies (Domain 1)

Episode 16: Deception and Disruption Technologies (Domain 1)

Dr. Jason Edwards