CISM 2022: Social Engineering & Malware
CISM
| Expert
- 8 videos | 42m 55s
- Includes Assessment
- Earns a Badge
Modern day IT device users must have an awareness of the deception by malicious actors through their devices. Recurring security awareness training in an organization is by far the most effective way to minimize realized threats against business assets. In this course, you will explore social engineering in its various forms, focusing on malware types like viruses, trojans, and ransomware. Then you will review various examples of phishing email messages and find out how to detect that they are fraudulent. Next, you will use the Metasploit Framework's Social-Engineer Toolkit (SET) to execute a social engineering attack, discover how botnets work, and learn how their function can be mitigated. You will configure a Microsoft Windows virus and threat protection. Finally, you will upload an infected file to an online service for malware scanning. This course can be used to prepare for the Certified Information Security Manager (CISM) exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseRecognize how social engineering uses deception to acquire sensitive informationList the characteristics of common malware typesDetermine when email messages are fraudulent for phishing and spear phishing attacks
-
Use the social-engineer toolkit (set) to execute social engineering attacksConfigure microsoft windows virus and threat protectionUpload infected files for analysis to a scanning serviceSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 11sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
7m 28sAfter completing this video, you will be able to recognize how social engineering uses deception to acquire sensitive information. FREE ACCESS
-
7m 24sUpon completion of this video, you will be able to list the characteristics of common malware types. FREE ACCESS
-
6m 19sDuring this video, you will learn how to determine when email messages are fraudulent for phishing and spear phishing attacks. FREE ACCESS
-
5m 42sFind out how to use the Social-Engineer Toolkit (SET) to execute social engineering attacks. FREE ACCESS
-
7m 17sIn this video, discover how to configure Microsoft Windows virus and threat protection. FREE ACCESS
-
6m 45sLearn how to upload infected files for analysis to a scanning service. FREE ACCESS
-
49sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.