CEH v12: Malware, Threats, Trojans, and Viruses
CEH v12
| Intermediate
- 4 videos | 1h 23m 2s
- Includes Assessment
- Earns a Badge
Malware is a common threat used to attack, compromise, and even destroy computer systems. In this course, you'll learn about common malware types and components so you can properly defend against malicious software. Then, you'll move on to explore advanced persistent threats (APTs), which are becoming more and more of a danger due to their sophisticated malware. You'll examine the malicious software version of the Trojan Horse, as well as the different types of Trojans, deployment methods, construction, and techniques for evading antivirus detection. Finally, you'll learn about viruses and worms, including concepts, types, and characteristics. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.
WHAT YOU WILL LEARN
-
Identify malware components used to download the malicious coderecognize the components of malicious softwareRecognize the purpose of apt groupsidentify the phases of an apt attackidentify the characteristics of an apt attackIdentify the different types of trojan malware
-
recognize techniques used to avoid trojan detectionidentify the malware deployment typesidentify the trojan type that includes running the real program in addition to the malicious codeIdentify malicious software that requires human interaction in order to replicate to a systemidentify the phases of the virus lifecyclerecognize the malware type that self-replicates
IN THIS COURSE
-
22m 47sUpon completion of this video, you will be able to identify common malware types and components that can be used to defend against malicious software. FREE ACCESS
-
20m 31sAfter completing this video, you will be able to outline the definition an advanced persistent threat (APT), and their common attributes and life cycle. FREE ACCESS
-
22m 57sUpon completion of this video, you will be able to recognize different types of Trojans, methods of deployment, and techniques for evading antivirus detection. FREE ACCESS
-
16m 48sAfter completing this video, you will be able to outline the concepts, types, and characteristics of computer viruses as well as its closest relation, the worm. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.