Cyber Deception

Course Group: 
Cyber Security

This 5-day course will provide students with hands-on experience of how to build, deploy and configure various cyber deception tools and technologies to protect computer networks and digital data. Students will use a combination of open source software, scripts and direct operating system configurations to create confusion, bait and trap intruders and unauthorised insiders.

Who Should Attend

Course Outline

Presenter Information

Dates & Registration

Duration: 5 days

Delivery Mode: Cyber Range


Advertised: Canberra, Melbourne & Sydney

In-house: Please contact the Professional Education Course Unit for more information. Recommended for groups of 10 or more.

What you will receive

  • Comprehensive set of course notes
  • UNSW Canberra certificate of attendance
  • Morning tea, lunch and afternoon te­­­a


This course is extremely valuable for managers and professional cyber security engineers. The need for awareness of cyber deception is growing. Gartner has identified cyber deception as one of the top 10 technologies for cyber defence and expect that many large businesses will be employing these technologies. Moving forward, managers and professionals will need to be aware of how to best utilise these solutions.

The course has been designed for people with a beginner and intermediate level of technical IT skill and experience. The majority of the course content is hands on activities. Students will configure and build cyber deceptions. Many of these will be using command line. The course will walk students through the basics of how to undertake each activity and provide them the means to complete the exercises. No academic or technical knowledge is assumed but the course can be challenging, in places if users are not familiar with basic IT and cyber security principles and tools.



1. Introduction to Cyber Deception  

2. Navigating the exercise material

3. Steganography


1. Hidden Partitions

2. Port obfuscation

2. Covert network tunnels


1. Sinkholes and tarpits

2. SSH honeypots

3. Industrial control system honeypots

4. Honeytokens and honeyfiles

5. Fake web pages, tables and user activity


1. Detecting honeypots and honeytokens

2. Customising honeypots

3. Applying machine learning to the problem


1. Planning deceptions

2. Mass deployment and management of honeypots

3. Integrating into other security systems


UNSW Canberra Cyber is a focal point for the research of some 60 scholars from various faculties across UNSW who conduct research work on different aspects of cyber security. The Centre is based in Canberra at the Defence Force Academy that provides both advanced research as well as undergraduate and graduate education on cyber security. UNSW Canberra Cyber brings together the biggest concentration of research and tertiary education for the multi-disciplinary study of cyber security in any single university in the Southern hemisphere. A number of UNSW Canberra Cyber scholars, in areas ranging from information technology and engineering to law and politics, have significant international reputations for their work.


No dates? Or unable to attend dates shown? Submit an Expression of Interest below to be notified of upcoming courses.