Fundamentals of Malware Analysis and Remediation

Cybersecurity    |    Beginner
  • 23 videos | 56m 12s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 56 users Rating 4.4 of 56 users (56)
Malware is any software with the intention to wreak destruction or gain access to sensitive information. Malware is often used as a blanket term for common computer worms, viruses, and trojans. In this course, you'll learn how to protect systems from malware by implementing and managing anti-malware software. Explore different malware infection methods and learn how to differentiate between different types of malware. Explore how viruses can attach themselves to system applications and learn about common virus threats. Discover how to differentiate between worms, trojans, rootkits, and bots, and explore how spyware and adware spyware can be embedded into applications that look free and interesting to use. Lastly, explore how ransomware works and discover countermeasures to protect against threats including user awareness programs, scanning systems, and monitoring network activity. This course was originally created by Global Knowledge (GK).

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Recognize the importance of implementing and managing anti-malware software
    Analyze suspicious files and urls using the virustotal website
    Define malware and recognize the damage it can cause
    Recognize different malware infection methods
    Differentiate between different types of malware
    Recognize how viruses can attach themselves to system applications and run every time a normal program runs
    Provide examples of common virus threats
    Discuss how worm infections spread from computer to computer
    List examples of worms including morris, mydoom, sobig, and stuxnet
    Describe how trojan horses deliver malicious code to a target
    Describe how bots and botnets operate
  • Discuss how backdoor exploits are used to bypass normal authentication or encryption in a computer
    Differentiate between backdoor threats including back orifice, sub 7, girlfriend, and nimda
    Recognize how rootkits work and how they can retrieve information
    Discuss how spyware can be embedded into applications that look free and interesting to use
    Remove spyware using an antispyware software program
    Differentiate between adware and scareware
    Identify a system that has been infected with adware toolbars
    Provide an overview of ransomware and describe how it can lock systems or data until a ransom is paid
    Describe common ransomware attacks and common threat messages
    List countermeasures to protect against threats including user awareness programs, scanning systems, and monitoring network activity
    List malicious code protection tools including antivirus, firewalls, anti-spyware, and intrusion detection systems

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 20 users Rating 4.6 of 20 users (20)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 4.5 of 48 users Rating 4.5 of 48 users (48)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 86 users Rating 4.5 of 86 users (86)
Rating 4.6 of 65 users Rating 4.6 of 65 users (65)
Rating 4.4 of 231 users Rating 4.4 of 231 users (231)