CISM 2022: Social Engineering & Malware

CISM    |    Expert
  • 8 videos | 42m 55s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 12 users Rating 4.5 of 12 users (12)
Modern day IT device users must have an awareness of the deception by malicious actors through their devices. Recurring security awareness training in an organization is by far the most effective way to minimize realized threats against business assets. In this course, you will explore social engineering in its various forms, focusing on malware types like viruses, trojans, and ransomware. Then you will review various examples of phishing email messages and find out how to detect that they are fraudulent. Next, you will use the Metasploit Framework's Social-Engineer Toolkit (SET) to execute a social engineering attack, discover how botnets work, and learn how their function can be mitigated. You will configure a Microsoft Windows virus and threat protection. Finally, you will upload an infected file to an online service for malware scanning. This course can be used to prepare for the Certified Information Security Manager (CISM) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Recognize how social engineering uses deception to acquire sensitive information
    List the characteristics of common malware types
    Determine when email messages are fraudulent for phishing and spear phishing attacks
  • Use the social-engineer toolkit (set) to execute social engineering attacks
    Configure microsoft windows virus and threat protection
    Upload infected files for analysis to a scanning service
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 11s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 7m 28s
    After completing this video, you will be able to recognize how social engineering uses deception to acquire sensitive information. FREE ACCESS
  • Locked
    3.  Malware Types
    7m 24s
    Upon completion of this video, you will be able to list the characteristics of common malware types. FREE ACCESS
  • Locked
    4.  Reviewing Phishing Attack Email Messages
    6m 19s
    During this video, you will learn how to determine when email messages are fraudulent for phishing and spear phishing attacks. FREE ACCESS
  • Locked
    5.  Executing a Social Engineering Attack
    5m 42s
    Find out how to use the Social-Engineer Toolkit (SET) to execute social engineering attacks. FREE ACCESS
  • Locked
    6.  Configuring Endpoint Malware Solutions
    7m 17s
    In this video, discover how to configure Microsoft Windows virus and threat protection. FREE ACCESS
  • Locked
    7.  Analyzing Infected Files
    6m 45s
    Learn how to upload infected files for analysis to a scanning service. FREE ACCESS
  • Locked
    8.  Course Summary
    49s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.8 of 4 users Rating 4.8 of 4 users (4)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.7 of 9 users Rating 4.7 of 9 users (9)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.8 of 44 users Rating 4.8 of 44 users (44)
Rating 4.6 of 14 users Rating 4.6 of 14 users (14)
Rating 4.8 of 21 users Rating 4.8 of 21 users (21)