CEH v11: Fileless Malware, Malware Analysis & Countermeasures

Ethical Hacker v11    |    Intermediate
  • 3 videos | 1h 3m 26s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 20 users Rating 4.7 of 20 users (20)
The most common way for anti-virus programs to detect a malware infection is by checking files against a database of known-malicious objects. In this course, you'll learn about fileless malware, which avoids detection by not writing any files with known malicious content. Next, you'll explore malware analysis techniques that allow you to configure stronger defenses. You'll also examine sheep dipping and how to build a test environment. There are many security controls to protect against malware infections, so you'll complete this course by learning about countermeasures like logging, anti-virus, and backups. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.

WHAT YOU WILL LEARN

  • Describe the different classifications of fileless malware
    describe the fileless malware infection process
    describe how to obfuscate commands to avoid detection
    identifying the steps of the fileless malware infection process
    identify the fileless malware classification types
    Recognize common malware analysis techniques
  • identify tools and techniques for doing malware analysis
    describe how to find or prevent malware using sheep dipping
    configure or build a malware test environment
    Recognize malware countermeasures that can empower you to create a system that is much more resilient to malware attacks
    identity malware countermeasures such as logging, monitoring, backups, and blocking that can make a system more resilient to malware attacks

IN THIS COURSE

  • Locked
    1.  Fileless Malware
    28m 22s
    Upon completion of this video, you will be able to describe how to obfuscate commands to avoid detection. FREE ACCESS
  • Locked
    2.  Malware Analysis
    21m 39s
    After completing this video, you will be able to recognize common malware analysis techniques. FREE ACCESS
  • Locked
    3.  Malware Countermeasures
    13m 25s
    After completing this video, you will be able to recognize malware countermeasures that can empower you to create a system that is much more resilient to malware attacks. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 20 users Rating 4.6 of 20 users (20)
Rating 4.5 of 79 users Rating 4.5 of 79 users (79)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.2 of 164 users Rating 4.2 of 164 users (164)
Rating 4.5 of 23 users Rating 4.5 of 23 users (23)
Rating 4.6 of 25 users Rating 4.6 of 25 users (25)