Understand the foundations of Advanced Persistent Threats (APTs) and their associated techniques (e.g., advanced command and control, persistency mechanisms, etc.).
Knowing the type of information and defense mechanisms deployed in a system, explain the impact of different threats and intrusions and, in particular, information leaks.
Explain the mechanisms that can be used to conceal an intrusion in a system.