CEH v11: Fileless Malware, Malware Analysis & Countermeasures
Ethical Hacker v11 | Intermediate
- 3 Videos | 1h 3m 26s
- Includes Assessment
- Earns a Badge
The most common way for anti-virus programs to detect a malware infection is by checking files against a database of known-malicious objects. In this course, you'll learn about fileless malware, which avoids detection by not writing any files with known malicious content. Next, you'll explore malware analysis techniques that allow you to configure stronger defenses. You'll also examine sheep dipping and how to build a test environment. There are many security controls to protect against malware infections, so you'll complete this course by learning about countermeasures like logging, anti-virus, and backups. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.
WHAT YOU WILL LEARN
describe the different classifications of fileless malwaredescribe the fileless malware infection processdescribe how to obfuscate commands to avoid detectionidentifying the steps of the fileless malware infection processidentify the fileless malware classification typesrecognize common malware analysis techniques
identify tools and techniques for doing malware analysisdescribe how to find or prevent malware using sheep dippingconfigure or build a malware test environmentrecognize malware countermeasures that can empower you to create a system that is much more resilient to malware attacksidentity malware countermeasures such as logging, monitoring, backups, and blocking that can make a system more resilient to malware attacks
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.