YoVDO

Cyber Security Foundations: Common Malware Attacks and Defense Strategies

Offered By: EC-Council via FutureLearn

Tags

Malware Analysis Courses Information Technology Courses Social Engineering Courses Ransomware Courses Viruses Courses Worms Courses Phishing Courses Spyware Courses

Course Description

Overview

According to Accenture, malware attacks are the most common type of cyber attack experienced by organizations around the world. These attacks are also the most expensive. Accenture estimates that they cost businesses an average of $2.6 million apiece each year.

The cyber security risks from malware are not limited to ransomware, however. Malware describes any sort of software that is designed to gain unauthorized access to a computer system such as trojan horses and spyware.

Learn how to prevent malware attacks

This cyber security course will guide you to improve your organization’s cyber resilience against malware attacks. You will study examples of malware attacks to understand common threats, and ultimately learn how to prevent malware attacks.

Understand cyber security risks and build cyber resilience

The threat from malware is constantly evolving. New threats continue to enter the market as existing actors’ operations grow more sophisticated. Part of the danger comes from changing business practices. 80% of businesses surveyed by Accenture were adopting new technologies faster than they were able to account for resulting cyber security risks.

The only way to successfully face down this challenge is through building organizational cyber resilience. The first step of malware protection is to know your enemy. This course will explore how to prevent malware attacks by helping you to recognize them.

You’ll learn about common types of malware attacks and different malware strategies, illustrated with case studies of malware attacks in action. You’ll further become familiar with modern malware families, gaining a structural understanding to help you keep pace with evolving threats.

This cyber security training is aimed at IT professionals who want to understand how to protect their organization from cyberattacks. This might include data administrators, those working with sensitive data, or those targeting a career in cyber security.


Syllabus

  • Phishing Related Cybersecurity Attacks
    • Welcome to the Course
    • Phishing
    • Spear-phishing
    • Whaling
    • Smishing
    • Vishing
    • Summary
  • Social Engineering Techniques
    • Welcome to Week 2
    • Dumpster Diving
    • Tailgating
    • Baiting
    • Impersonation
    • Summary
  • An Introduction to the World of Malware
    • Welcome to Week 3
    • Malware in the Real World and the Media
    • What Is a Virus?
    • What Are Worms?
    • What Are Trojans?
    • What Is Ransomware?
    • Summary
  • Malware Today
    • Welcome to Week 4
    • Adware: Unclosable Ad Traps
    • Spyware: Invades Devices and Steals Sensitive Information
    • File-less Malware: Sneaks into Your Running Application
    • The Hybrid Attack: A Combination of Different Malware
    • Summary

Taught by

EC-Council Educator Team

Related Courses

Artificial Intelligence for Cybersecurity
LinkedIn Learning
Avoiding Phishing Scams
LinkedIn Learning
Cybersecurity Awareness: Phishing and Whaling
LinkedIn Learning
Cybersecurity Awareness: Social Engineering
LinkedIn Learning
Cybersecurity Foundations
LinkedIn Learning