This document provides an overview and schedule for a training on active deception techniques for red and blue teams. It covers topics like external reconnaissance, privilege escalation, and lateral movement. Deception strategies are discussed for each topic to detect adversarial activities like DNS reconnaissance, exploiting unattend files, or cloning webpages. The training will include hands-on exercises and visualizations in Kibana to detect engagement with deception assets.