CRISC 2023: Malware
CRISC
| Intermediate
- 11 videos | 1h 5m 29s
- Includes Assessment
- Earns a Badge
Threat actors use social engineering and exploit vulnerabilities to achieve their goals. Performance and security baselines can facilitate threat detection. In this course, I will begin by covering threat actor types. I will then explain the relationship between baselines and threat detection. Next, I will discuss indicators of malicious activity at the network, host and application levels. I will define how social engineering is a major threat and demonstrate how to execute a social engineering attack. Lastly, I will discuss common malware types, explore malware techniques, and analyze email messages. This course can be used to prepare for the ISACA(r) Certified in Risk and Information Systems Control (CRISC(r)) certification.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseIdentify different sources and motivations for it threatsRecognize indicators of malicious network activityRecognize indicators of malicious host activityRecognize indicators of malicious application activityOutline how social engineering uses deception to acquire sensitive information
-
Use the social-engineer toolkit (set) to execute social engineering attacksList the characteristics of common malware typesName techniques used for malware analysisUse various techniques to determine the authenticity of email messagesSummarize the key concepts covered in this course
IN THIS COURSE
-
58sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
6m 35sAfter completing this video, you will be able to identify different sources and motivations for IT threats. FREE ACCESS
-
7m 36sUpon completion of this video, you will be able to recognize indicators of malicious network activity. FREE ACCESS
-
7m 38sAfter completing this video, you will be able to recognize indicators of malicious host activity. FREE ACCESS
-
6m 26sUpon completion of this video, you will be able to recognize indicators of malicious application activity. FREE ACCESS
-
6m 8sAfter completing this video, you will be able to outline how social engineering uses deception to acquire sensitive information. FREE ACCESS
-
6m 33sIn this video, find out how to use the Social-Engineer Toolkit (SET) to execute social engineering attacks. FREE ACCESS
-
11m 19sUpon completion of this video, you will be able to list the characteristics of common malware types. FREE ACCESS
-
6m 27sAfter completing this video, you will be able to name techniques used for malware analysis. FREE ACCESS
-
4m 57sLearn how to use various techniques to determine the authenticity of email messages. FREE ACCESS
-
51sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.