CRISC 2023: Malware

CRISC    |    Intermediate
  • 11 videos | 1h 5m 29s
  • Includes Assessment
  • Earns a Badge
Rating 4.8 of 5 users Rating 4.8 of 5 users (5)
Threat actors use social engineering and exploit vulnerabilities to achieve their goals. Performance and security baselines can facilitate threat detection. In this course, I will begin by covering threat actor types. I will then explain the relationship between baselines and threat detection. Next, I will discuss indicators of malicious activity at the network, host and application levels. I will define how social engineering is a major threat and demonstrate how to execute a social engineering attack. Lastly, I will discuss common malware types, explore malware techniques, and analyze email messages. This course can be used to prepare for the ISACA(r) Certified in Risk and Information Systems Control (CRISC(r)) certification.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Identify different sources and motivations for it threats
    Recognize indicators of malicious network activity
    Recognize indicators of malicious host activity
    Recognize indicators of malicious application activity
    Outline how social engineering uses deception to acquire sensitive information
  • Use the social-engineer toolkit (set) to execute social engineering attacks
    List the characteristics of common malware types
    Name techniques used for malware analysis
    Use various techniques to determine the authenticity of email messages
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 58s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 6m 35s
    After completing this video, you will be able to identify different sources and motivations for IT threats. FREE ACCESS
  • Locked
    3.  Network Indicators of Malicious Activity
    7m 36s
    Upon completion of this video, you will be able to recognize indicators of malicious network activity. FREE ACCESS
  • Locked
    4.  Host Indicators of Malicious Activity
    7m 38s
    After completing this video, you will be able to recognize indicators of malicious host activity. FREE ACCESS
  • Locked
    5.  Application Indicators of Malicious Activity
    6m 26s
    Upon completion of this video, you will be able to recognize indicators of malicious application activity. FREE ACCESS
  • Locked
    6.  Social Engineering
    6m 8s
    After completing this video, you will be able to outline how social engineering uses deception to acquire sensitive information. FREE ACCESS
  • Locked
    7.  Executing a Social Engineering Attack
    6m 33s
    In this video, find out how to use the Social-Engineer Toolkit (SET) to execute social engineering attacks. FREE ACCESS
  • Locked
    8.  Common Malware Types
    11m 19s
    Upon completion of this video, you will be able to list the characteristics of common malware types. FREE ACCESS
  • Locked
    9.  Malware Techniques and Email Analysis
    6m 27s
    After completing this video, you will be able to name techniques used for malware analysis. FREE ACCESS
  • Locked
    10.  Analyzing Suspicious Email Messages
    4m 57s
    Learn how to use various techniques to determine the authenticity of email messages. FREE ACCESS
  • Locked
    11.  Course Summary
    51s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)