APT-based incidents are hard, if not outright impossible to prevent, making them the type of incident that often requires well-defined response and recovery plans. The topics covered in this guide are reconnaissance,weaponization and delivery, exploitation and installation, command and control, and exfiltration. The takeaway is that it’s entirely possible to defend against attacks of all types and sizes, but it isn’t easy. The processes and tools behind a true APT campaign: Reconnaissance, Weaponization and Delivery, Exploitation and Installation, Command & Control, and Exfiltration are covered.”]
Source: https://www.csoonline.com/article/2134332/cso-s-guide-to-advanced-persistent-threats.html