CompTIA Cybersecurity Analyst+: Malware Threats

Cybersecurity Analyst+    |    Intermediate
  • 13 videos | 52m 44s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 112 users Rating 4.5 of 112 users (112)
Perhaps nothing is more frustrating for the average computer user-or his IT security staffer-than being tricked into divulging sensitive information by a social engineering practitioner. Hackers are malicious and ingenious-using malware, bots, ransomware, viruses, and plain garden-variety scams-but there are sensible ways to reduce the risk. This 13-video course offers you invaluable information on hackers' methods and ways to mitigate their devious schemes-whether by e-mail phishing messages, malware, or bots, a favorite tool of black-market operators. Next, learners explore the danger of ransomware and how to mitigate this threat; how malware and botnets have become black-market commodities; and why botnets are proliferating under cybercriminals' user control. Then watch a demonstration of how to configure a reverse shell and use the Malzilla tool to explore malicious web pages. The course concludes by exploring a GUI (graphical user interface) malware dashboard and showing how to configure malware settings on an endpoint device. The course helps to prepare learners for CompTIA+ Cybersecurity Analyst+ (CySA+) CS0-002 certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Recognize differences between malware types
    Identify the various forms of social engineering and the related security risks
    View authentic e-mail phishing messages
    Use the social engineering toolkit to execute social engineering attacks
    Recognize the danger of ransomware and how to mitigate this threat
    Recognize how malware and resultant botnets have become a commodity for black markets
  • Describe the proliferation of botnets under malicious user control
    Configure a reverse shell
    View an analysis for various scam web sites
    View a gui malware dashboard
    Configure malware settings on an endpoint device
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 2m 10s
  • 5m 19s
    Upon completion of this video, you will be able to recognize differences between types of malware. FREE ACCESS
  • Locked
    3.  Social Engineering
    9m 13s
    In this video, you will learn how to identify the various forms of social engineering and the related security risks. FREE ACCESS
  • Locked
    4.  Social Engineering Examples
    3m 49s
    In this video, learn how to view authentic email phishing messages. FREE ACCESS
  • Locked
    5.  Social Engineering in Action
    4m 47s
    Find out how to use the Social Engineering Toolkit to carry out social engineering attacks. FREE ACCESS
  • Locked
    6.  Ransomware
    3m 18s
    After completing this video, you will be able to recognize the danger of ransomware and how to reduce this threat. FREE ACCESS
  • Locked
    7.  Commodity Malware
    2m 48s
    After completing this video, you will be able to recognize how malware and resultant botnets have become a commodity for black markets. FREE ACCESS
  • Locked
    8.  Botnets
    1m 59s
    After completing this video, you will be able to describe the proliferation of botnets under the control of malicious users. FREE ACCESS
  • Locked
    9.  Reverse Shell
    5m 25s
    In this video, find out how to configure a reverse shell. FREE ACCESS
  • Locked
    10.  Internet Scams
    4m 35s
    In this video, find out how to view an analysis of various scam websites. FREE ACCESS
  • Locked
    11.  Malware Dashboard
    4m 8s
    During this video, you will learn how to view a malware dashboard in a graphical user interface. FREE ACCESS
  • Locked
    12.  Endpoint Security
    3m 43s
    In this video, you will configure malware settings on an endpoint device. FREE ACCESS
  • Locked
    13.  Course Summary
    1m 28s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 4.6 of 20 users Rating 4.6 of 20 users (20)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.7 of 45 users Rating 4.7 of 45 users (45)
Rating 4.5 of 1116 users Rating 4.5 of 1116 users (1116)
Rating 4.5 of 443 users Rating 4.5 of 443 users (443)