CEH v11: Malware, Threats, Trojans & Viruses

Ethical Hacker v11    |    Intermediate
  • 4 videos | 1h 12m 31s
  • Includes Assessment
  • Earns a Badge
Rating 4.2 of 17 users Rating 4.2 of 17 users (17)
Malware is a common threat used to attack, compromise, and even destroy computer systems. In this course, you'll learn about common malware types and components so you can properly defend against malicious software. Then, you'll move on to explore Advanced Persistent Threats, which are becoming more and more of a danger due to their sophisticated malware. You'll examine the malicious software version of the Trojan Horse, as well as the different types of trojans, deployment methods, construction, and techniques for evading anti-virus detection. Finally, you'll learn about viruses and worms, including concepts, types, and characteristics. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.

WHAT YOU WILL LEARN

  • Identify malware components used to download the malicious code
    recognize the components of malicious software
    Recognize the purpose of apt groups
    identify the characteristics of an apt attack
    identify the phases of an apt attack
    Identify the different types of trojan malware
  • recognize techniques used to avoid trojan detection
    identify the trojan type that includes running the real program in addition to the malicious code
    identify the malware deployment types
    Identify malicious software that requires human interaction in order to replicate to a system
    recognize the malware type that self-replicates
    identify the phases of the virus lifecycle

IN THIS COURSE

  • Locked
    1.  Malware Concepts and Components
    14m 4s
    After completing this video, you will be able to recognize the components of malicious software. FREE ACCESS
  • Locked
    2.  Advanced Persistent Threats
    18m 1s
    In this video, find out how to identify the characteristics of an advanced persistent threat attack. FREE ACCESS
  • Locked
    3.  Trojans
    24m 39s
    Learn how to identify the types of malware deployment. FREE ACCESS
  • Locked
    4.  Viruses and Worms
    15m 48s
    After completing this video, you will be able to recognize the malware type that replicates itself. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 20 users Rating 4.6 of 20 users (20)
Rating 4.5 of 23 users Rating 4.5 of 23 users (23)
Rating 4.4 of 56 users Rating 4.4 of 56 users (56)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 250 users Rating 4.5 of 250 users (250)
Rating 4.8 of 41 users Rating 4.8 of 41 users (41)
Rating 4.7 of 20 users Rating 4.7 of 20 users (20)