YoVDO

Ethical Hacking: Malware Threats

Offered By: Pluralsight

Tags

Ethical Hacking Courses Malware Courses Viruses Courses Worms Courses

Course Description

Overview

Pluralsight is not an official partner or accredited training center of EC-Council. This course will take you deep into the dark alley of how malware is used and deployed. We'll also dive into how Trojans and backdoors work.

Pluralsight is not an official partner or accredited training center of EC-Council. The easiest way to get into a system or network is to get someone to let us in. Do you pirate software, movies, music, or heaven forbid - an operating system? I'm about 99.999% sure you've already been pwned. Malware is specifically designed to gain access or damage systems without the knowledge of the victim. Malware is on the rise due to the sheer volume of new types that are easily created daily, and the money that can be made through organized Internet crime. We'll talk about the various malware types, including viruses, Trojans, and worms. Now, we won't leave you in despair, we'll also talk about countermeasures and ways to detect these bad boys. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking

Topics:
  • The Hard Truth Behind Malware
  • What's a Trojan?
  • Trojan Infections
  • Types of Trojans
  • Virus and Worms
  • Detecting Malware
  • Countermeasures

Taught by

Dale Meredith

Related Courses

Sicherheit im Internet
openHPI
The Absolute Beginners Guide to Cyber Security 2024 - Part 1
Udemy
Cyber Security Foundations: Common Malware Attacks and Defense Strategies
EC-Council via FutureLearn
Cyberthreats: Malware
openHPI
Ethical Hacking: The Complete Malware Analysis Process
LinkedIn Learning