Fundamentals of Malware Analysis and Remediation
Cybersecurity
| Beginner
- 23 videos | 56m 12s
- Includes Assessment
- Earns a Badge
Malware is any software with the intention to wreak destruction or gain access to sensitive information. Malware is often used as a blanket term for common computer worms, viruses, and trojans. In this course, you'll learn how to protect systems from malware by implementing and managing anti-malware software. Explore different malware infection methods and learn how to differentiate between different types of malware. Explore how viruses can attach themselves to system applications and learn about common virus threats. Discover how to differentiate between worms, trojans, rootkits, and bots, and explore how spyware and adware spyware can be embedded into applications that look free and interesting to use. Lastly, explore how ransomware works and discover countermeasures to protect against threats including user awareness programs, scanning systems, and monitoring network activity. This course was originally created by Global Knowledge (GK).
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseRecognize the importance of implementing and managing anti-malware softwareAnalyze suspicious files and urls using the virustotal websiteDefine malware and recognize the damage it can causeRecognize different malware infection methodsDifferentiate between different types of malwareRecognize how viruses can attach themselves to system applications and run every time a normal program runsProvide examples of common virus threatsDiscuss how worm infections spread from computer to computerList examples of worms including morris, mydoom, sobig, and stuxnetDescribe how trojan horses deliver malicious code to a targetDescribe how bots and botnets operate
-
Discuss how backdoor exploits are used to bypass normal authentication or encryption in a computerDifferentiate between backdoor threats including back orifice, sub 7, girlfriend, and nimdaRecognize how rootkits work and how they can retrieve informationDiscuss how spyware can be embedded into applications that look free and interesting to useRemove spyware using an antispyware software programDifferentiate between adware and scarewareIdentify a system that has been infected with adware toolbarsProvide an overview of ransomware and describe how it can lock systems or data until a ransom is paidDescribe common ransomware attacks and common threat messagesList countermeasures to protect against threats including user awareness programs, scanning systems, and monitoring network activityList malicious code protection tools including antivirus, firewalls, anti-spyware, and intrusion detection systems
IN THIS COURSE
-
47s
-
42s
-
3m 32s
-
1m 57s
-
3m 31s
-
2m 27s
-
3m 41s
-
3m 20s
-
2m 4s
-
3m
-
2m 9s
-
6m 9s
-
2m 9s
-
2m 3s
-
1m 39s
-
2m 28s
-
2m 5s
-
1m 32s
-
38s
-
1m 38s
-
1m 13s
-
5m 5s
-
2m 22s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.