back to top

UC – Detection via Deception

Adrian Sanabria explains why deception is the most overlooked opportunity in security operations today. This Free Upskill Challenge provides an introduction into how honeypots and honeytokens can be used as a cheat code for detection engineering.

Price = FREE!

Get a glimpse into the devious and delightful world of defender deception. Defenders have the home court advantage but often donโ€™t take advantage of it. Attackers gain access to an enterprise environment and find default settings, familiar architectures, and arenโ€™t challenged or detected when pivoting through environments.

Thereโ€™s a common phrase I find annoying: “Attackers only have to get it right once; defenders have to get it right every time.”

Not only is this sentiment untrue, itโ€™s also demotivating and defeatist. This phrase is only correct for theย first step of the attack. Following that, the power balance flips, as the attacker is in the defenderโ€™s house. Much like Kevin in Home Alone, thereโ€™s no reason the attacker should have an easy time. Once in the defenderโ€™s environment, it is the attacker that has to evade detection 100% of the time, and the defender only needs to detect the attacker once.

Whatโ€™s an Upskill Challenge (UC)?

A UC is a CTF-style, bite-sized lesson from the JHT Team, our courseware developers as well as โ€œfriendsโ€ of JHT. They are meant to be short and to the point. UCs focus on a single tool or concept and are helpful in quickly providing useful skills that might be prerequisites for other types of educational content on the platform.

A UC should be 10 โ€“ 30 minutes of student time and have no VMs. There are quizzes to make sure that the content is understood.

Prerequisites for UC – Detection via Deception

UCs assume no knowledge at all! Theyโ€™re meant to be completely self-contained, so all of the answers are in the lesson. No outside research is required.


Announcements

๐ŸŽ… Cyber Monday December ๐ŸŽ…

Code "CYBER25" = 25% Off ALL Courses until Mid ET Dec 31! Excludes Bundles & NameYourPrice items.

New Releases

- Windows Log Analysis - SIEMless Threat Hunting Learn threat hunting basics using only Win & open source tools. Just $45 w/ labs!
- 2 New Bundles - 50% OFF 7 CTF Bundle, 75% Off 7 Hack-Along Bundle
- Blog - Blue Team Training Roadmap

Top Picks

- ConDef 2025 Only $375 w/ Code CYBER25!
- The Mishaal Bundle
- Phishing โ€“ A Technical Course for Red Teaming

Courses In Production

WMD 5, WebApp Pentest, Network Pentest, Deception, OS Hardening, Hardware Hacking 101, Dark Web 2...

Additional content in this category: