CompTIA Cybersecurity Analyst+: Malware
Cybersecurity
| Intermediate
- 15 videos | 1h 33m 39s
- Includes Assessment
- Earns a Badge
Malicious actors are motivated and influenced by a variety of factors, and one of the most effective security mechanisms organizations can employ is user awareness and training on security threats. Cybersecurity analysts must be aware of various types of attacks and how scripting languages and tools are used to execute these attacks. In this course, learn about threat actor types and their motivations and how security baselines facilitate the identification of non-compliant devices. Next, explore examples of social engineering attacks and use the Social-Engineer Toolkit (SET) to execute such an attack. Finally, examine the characteristics of malware types, common scripting languages, and how to recognize potential indicators of malicious activity. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseIdentify different sources and motivations for it threatsOutline how security and performance baselines facilitate threat identificationRecognize how social engineering uses deception to acquire sensitive informationUse the social-engineer toolkit (set) to execute social engineering attacksList the characteristics of common malware typesName techniques used for malware analysisOutline common languages used for scripting
-
Create and test a microsoft powershell scriptCreate and test a bash shell script that uses regular expressionsCreate and test a python scriptIdentify indicators of malicious network activityRecognize indicators of malicious host activityOutline indicators of malicious application activitySummarize the key concepts covered in this course
IN THIS COURSE
-
1m 22sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
7m 17sAfter completing this video, you will be able to identify different sources and motivations for IT threats. FREE ACCESS
-
7m 13sUpon completion of this video, you will be able to outline how security and performance baselines facilitate threat identification. FREE ACCESS
-
7m 20sAfter this video, you will recognize how social engineering uses deception to acquire sensitive information. FREE ACCESS
-
6m 26sIn this video, discover how to use the Social-Engineer Toolkit (SET) to execute social engineering attacks. FREE ACCESS
-
9m 14sIn this video, we will list the characteristics of common malware types. FREE ACCESS
-
6m 45sUpon completion of this video, you will be able to name techniques used for malware analysis. FREE ACCESS
-
6m 12sAfter completing this video, you will be able to outline common languages used for scripting. FREE ACCESS
-
7m 12sLearn how to create and test a Microsoft PowerShell script. FREE ACCESS
-
7m 12sDuring this video, discover how to create and test a Bash shell script that uses regular expressions. FREE ACCESS
-
5m 14sIn this video, find out how to create and test a Python script. FREE ACCESS
-
6m 36sIn this video, we will identify indicators of malicious network activity. FREE ACCESS
-
7mAfter completing this video, you will be able to recognize indicators of malicious host activity. FREE ACCESS
-
7m 32sUpon completion of this video, you will be able to outline indicators of malicious application activity. FREE ACCESS
-
1m 6sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.