The Honeypot Defense Lab: Advanced Deception (One day
Wednesday May 13th 2026) $1100 • $1100
Technology Workshop
This comprehensive training program introduces cybersecurity professionals to the strategic
world of honeypots and deception technologies in modern security architectures. Designed for
security engineers, SOC analysts, and threat hunters, this hands-on course demonstrates how to
Course Outline
Technology Workshop
This comprehensive training program introduces cybersecurity professionals to the strategic
world of honeypots and deception technologies in modern security architectures. Designed for
security engineers, SOC analysts, and threat hunters, this hands-on course demonstrates how to effectively deploy, manage, and analyze honeypot systems to enhance threat detection, gather threat intelligence, and strengthen organizational defense postures.
What You'll Learn
Participants will gain deep expertise in honeypot fundamentals, including low-interaction,medium-interaction, and high-interaction honeypot technologies. The course progresses through advanced topics including honeypot architecture design, deployment strategies, and specialized platforms such as Cowrie, Dionaea, T-Pot, and custom honeypot development. A strong emphasis on practical implementation ensures learners can immediately deploy production-ready deception systems and integrate honeypot intelligence into existing security operations.
Key Focus Areas
Threat Intelligence Collection: Deploy honeypots to capture real-world attack patterns,
malware samples, and adversary techniques
Attack Detection: Build honeypot networks for early warning systems and lateral movement
detection
Malware Analysis: Implement sandboxed environments for safe malware collection and
behavioral analysis
Forensic Investigation: Master log analysis, artifact collection, and attack timeline
reconstruction from honeypot data
Hands-On Experience
Through intensive lab sessions, participants will build practical solutions including SSH/Telnet
honeypots, web application traps, network service emulators, honeypot farm management
systems, and automated threat intelligence extraction pipelines. Labs include real-world attack
simulation, log analysis workshops, and integration with SIEM platforms.
Target Audience
Security engineers, SOC analysts, threat hunters, incident responders, and cybersecurity
researchers seeking to implement deception technologies and enhance threat detection
capabilities through honeypot deployments.
Prerequisites
Basic understanding of cybersecurity concepts, networking fundamentals, and familiarity with
Linux command line operations recommended.