CEH v11: Malware, Threats, Trojans & Viruses
Ethical Hacker v11
| Intermediate
- 4 Videos | 1h 12m 31s
- Includes Assessment
- Earns a Badge
Malware is a common threat used to attack, compromise, and even destroy computer systems. In this course, you'll learn about common malware types and components so you can properly defend against malicious software. Then, you'll move on to explore Advanced Persistent Threats, which are becoming more and more of a danger due to their sophisticated malware. You'll examine the malicious software version of the Trojan Horse, as well as the different types of trojans, deployment methods, construction, and techniques for evading anti-virus detection. Finally, you'll learn about viruses and worms, including concepts, types, and characteristics. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.
WHAT YOU WILL LEARN
-
identify malware components used to download the malicious coderecognize the components of malicious softwareidentify the characteristics of an APT attackidentify the phases of an APT attackrecognize the purpose of APT groupsidentify the different types of trojan malware
-
identify the malware deployment typesidentify the trojan type that includes running the real program in addition to the malicious coderecognize techniques used to avoid trojan detectionidentify malicious software that requires human interaction in order to replicate to a systemidentify the phases of the virus lifecyclerecognize the malware type that self-replicates
IN THIS COURSE
-
1.Malware Concepts and Components14m 4s
-
2.Advanced Persistent Threats18m 1s
-
3.Trojans24m 39s
-
4.Viruses and Worms15m 48s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.