YoVDO

Malware Threats

Offered By: Cybrary

Tags

Malware Analysis Courses Cybersecurity Courses Penetration Testing Courses

Course Description

Overview

This basic malware course is a good starting point for students interested in both penetration testing and malware analysis. Students studying for industry certification exams, like CEH, may find the course beneficial.

Prerequisites

Students should be familiar with common IT and cybersecurity terminology.

Study Resources

The course will include a study guide and glossary. Students will also get step by step guides for all labs.

Course Goals

By the end of this course, students should be able to:

  • Explain the common types of malware
  • Analyze a malicious file

This skill-based malware analysis course is intended to introduce students to malware, terminology, and focuses on a hands-on approach with labs. Several labs will help reinforce the learning. This course is instructed at a beginner level. Ideally, students will either be pursuing certifications, like the EC-Council Certified Ethical Hacker (CEH), CompTIA Pentest+, or OSCP, since the knowledge gained in this course will help students prepare for these examinations.

Want to go into more depth? Take our malware analysis course too!


Syllabus

  • Introduction
    • Introduction
    • Malware Introduction
  • Analyze Malware
    • Analyze and Classify Malware Lab Part 1
    • Analyze and Classify Malware Lab Part 2
    • Analyze and Classify Malware
    • Rootkit Lab Part 1
    • Rootkit Lab Part 2
    • Rootkit Lab Part 3
    • RootKit
  • Conclusion
    • Conclusion
  • Course Assessment
    • Course Assessment - Malware Threats

Taught by

Ken Underhill

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network