CompTIA Cybersecurity Analyst+: Malware & Digital Forensics

Cyber Security    |    Intermediate
  • 15 videos | 1h 9m 2s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 42 users Rating 4.6 of 42 users (42)
Malware, short for malicious software, is software intended to gain access to, damage, or disable computer systems. Explore various types of malware, mitigation techniques, and how to use digital forensic tools to combat threats.

WHAT YOU WILL LEARN

  • Identify different types of malware
    Identify viruses
    Identify  worms
    Identity spyware and adware
    Explain how ransomware works
    Mitigate malware using antimalware solutions
    Explain why user training and awareness is one of the most important security defenses
    Describe digital forensics
  • Determine which forensic hardware is best suited for a specific situation
    Determine which forensic software is best suited for a specific situation
    Explain how forensic tools can be used against data stored on media
    Distinguish common forensic tools from one another
    Explain the sequence of steps that should be followed when conducting mobile device forensics
    Create a memory dump
    Retrieve and view deleted files

IN THIS COURSE

  • 6m 31s
    Learn how to identify different types of malware. FREE ACCESS
  • 4m 26s
    Find out how to identify viruses. FREE ACCESS
  • Locked
    3.  Worms
    2m 49s
    Learn how to identify worms. FREE ACCESS
  • Locked
    4.  Spyware, Adware
    3m 11s
    In this video, you will identify spyware and adware. FREE ACCESS
  • Locked
    5.  Ransomware
    6m 19s
    After completing this video, you will be able to explain how ransomware works. FREE ACCESS
  • Locked
    6.  Antimalware
    8m 12s
    In this video, learn how to reduce malware using antimalware solutions. FREE ACCESS
  • Locked
    7.  User Training and Awareness
    6m 10s
    After completing this video, you will be able to explain why user training and awareness is one of the most important security defenses. FREE ACCESS
  • Locked
    8.  Digital Forensics Overview
    4m 14s
    After completing this video, you will be able to describe digital forensics. FREE ACCESS
  • Locked
    9.  Digital Forensics Hardware
    2m 25s
    During this video, you will learn how to determine which forensic hardware is best suited for a specific situation. FREE ACCESS
  • Locked
    10.  Digital Forensics Software
    4m 34s
    In this video, you will learn how to determine which forensic software is best suited for a specific situation. FREE ACCESS
  • Locked
    11.  Digital Forensics and Data at Rest
    3m 17s
    After completing this video, you will be able to explain how forensic tools can be used against data stored on media. FREE ACCESS
  • Locked
    12.  Common Digital Forensic Tools
    4m 50s
    Learn how to distinguish common forensic tools from each other. FREE ACCESS
  • Locked
    13.  Mobile Device Forensics
    2m 57s
    After completing this video, you will be able to explain the sequence of steps that should be followed when conducting mobile device forensics. FREE ACCESS
  • Locked
    14.  Creating a Physical Memory Dump
    5m 36s
    In this video, find out how to create a memory dump. FREE ACCESS
  • Locked
    15.  Viewing Deleted Files on a Hard Disk
    3m 32s
    In this video, learn how to retrieve and view files that have been deleted. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 17 users Rating 4.4 of 17 users (17)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 4.8 of 52 users Rating 4.8 of 52 users (52)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.1 of 291 users Rating 4.1 of 291 users (291)
Rating 4.5 of 6258 users Rating 4.5 of 6258 users (6258)
Course IS Controls
Rating 4.7 of 25 users Rating 4.7 of 25 users (25)