YoVDO

Ethical Hacking: Malware Threats

Offered By: Pluralsight

Tags

Ethical Hacking Courses Malware Courses Viruses Courses Worms Courses Network Infrastructure Courses

Course Description

Overview

Malware is specifically designed to gain access or damage systems without the knowledge of the victim. This course will teach you how malware is created, utilized, and detected. You’ll learn all that is needed for the CEH 312-50 exam concerning malware.

The easiest way to get into a system or network is…to get someone to let us in. Malware is on the rise due to the sheer volume of new devices and users being added daily to network infrastructures. In this course, Ethical Hacking: Malware Threats, you’ll learn how malware is created, utilized, and detected on networks. First, you’ll explore the different concepts and types of trojans, viruses, and worms. Next, you’ll discover malware concepts and components. Finally, you’ll learn the different countermeasures every organization should be following. When you’re finished with this course, you’ll have the skills and knowledge of malware threats needed for the CEH 312-50 exam.

Syllabus

  • Course Overview 2mins
  • Explaining Malware Threats 51mins
  • Discussing Advanced Persistent Threats (APT) 16mins
  • Explaining Trojans 28mins
  • Diving Deeper into Trojans 27mins
  • Describing the Types of Trojans 40mins
  • Explaining Worms and Viruses 46mins
  • Reviewing Fileless Malware 25mins
  • Detecting Malware 39mins
  • Deploying Countermeasure for Malware 21mins
  • Domain Summary 2mins

Taught by

Dale Meredith

Related Courses

Advanced Python Scripting for Cybersecurity
Infosec via Coursera
Python for Command-and-control, Exfiltration and Impact
Infosec via Coursera
Fundamentos del Internet de las cosas (IoT): Seguridad I
Galileo University via edX
MSc Cyber Security
Coventry University via FutureLearn
Cyber Incident Response
Infosec via Coursera