CompTIA Cybersecurity Analyst+: Malware

Cybersecurity    |    Intermediate
  • 15 videos | 1h 33m 39s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Malicious actors are motivated and influenced by a variety of factors, and one of the most effective security mechanisms organizations can employ is user awareness and training on security threats. Cybersecurity analysts must be aware of various types of attacks and how scripting languages and tools are used to execute these attacks. In this course, learn about threat actor types and their motivations and how security baselines facilitate the identification of non-compliant devices. Next, explore examples of social engineering attacks and use the Social-Engineer Toolkit (SET) to execute such an attack. Finally, examine the characteristics of malware types, common scripting languages, and how to recognize potential indicators of malicious activity. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Identify different sources and motivations for it threats
    Outline how security and performance baselines facilitate threat identification
    Recognize how social engineering uses deception to acquire sensitive information
    Use the social-engineer toolkit (set) to execute social engineering attacks
    List the characteristics of common malware types
    Name techniques used for malware analysis
    Outline common languages used for scripting
  • Create and test a microsoft powershell script
    Create and test a bash shell script that uses regular expressions
    Create and test a python script
    Identify indicators of malicious network activity
    Recognize indicators of malicious host activity
    Outline indicators of malicious application activity
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 22s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 7m 17s
    After completing this video, you will be able to identify different sources and motivations for IT threats. FREE ACCESS
  • Locked
    3.  Malicious Activity and Baselines
    7m 13s
    Upon completion of this video, you will be able to outline how security and performance baselines facilitate threat identification. FREE ACCESS
  • Locked
    4.  Social Engineering
    7m 20s
    After this video, you will recognize how social engineering uses deception to acquire sensitive information. FREE ACCESS
  • Locked
    5.  Executing a Social Engineering Attack
    6m 26s
    In this video, discover how to use the Social-Engineer Toolkit (SET) to execute social engineering attacks. FREE ACCESS
  • Locked
    6.  Common Malware Types
    9m 14s
    In this video, we will list the characteristics of common malware types. FREE ACCESS
  • Locked
    7.  Malware Techniques and Email Analysis
    6m 45s
    Upon completion of this video, you will be able to name techniques used for malware analysis. FREE ACCESS
  • Locked
    8.  Common Scripting Languages
    6m 12s
    After completing this video, you will be able to outline common languages used for scripting. FREE ACCESS
  • Locked
    9.  Creating and Running a PowerShell Script
    7m 12s
    Learn how to create and test a Microsoft PowerShell script. FREE ACCESS
  • Locked
    10.  Making and Running a Bash Script
    7m 12s
    During this video, discover how to create and test a Bash shell script that uses regular expressions. FREE ACCESS
  • Locked
    11.  Creating and Running a Python Script
    5m 14s
    In this video, find out how to create and test a Python script. FREE ACCESS
  • Locked
    12.  Network Indicators of Malicious Activity
    6m 36s
    In this video, we will identify indicators of malicious network activity. FREE ACCESS
  • Locked
    13.  Host Indicators of Malicious Activity
    7m
    After completing this video, you will be able to recognize indicators of malicious host activity. FREE ACCESS
  • Locked
    14.  Application Indicators of Malicious Activity
    7m 32s
    Upon completion of this video, you will be able to outline indicators of malicious application activity. FREE ACCESS
  • Locked
    15.  Course Summary
    1m 6s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 4 users Rating 5.0 of 4 users (4)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 5.0 of 4 users Rating 5.0 of 4 users (4)
Rating 4.6 of 41 users Rating 4.6 of 41 users (41)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)