Understanding and Managing the threat of Malware

Level
Total time

Understanding and Managing the threat of Malware

Perpetual Solutions
Logo Perpetual Solutions
Provider rating: starstarstarstarstar 10 Perpetual Solutions has an average rating of 10 (out of 1 reviews)

Need more information? Get more details on the site of the provider.

Starting dates and places

This product does not have fixed starting dates and/or places.

Description

Prerequisites:

The prerequisites for this workshop are attendance of the Security Fundamentals course, or equivalent knowledge.

Course Description:

This 3-day workshop is designed to give delegates a broad overview of both the technical and social engineering aspects of modern malware.

This instructor-led event will combine lectures on the types of malware currently in use on the Internet, how that malware is created and distributed, strategies used for infecting victims, and how malware can be detected and removed. The course also contains exercises in which delegates will inspect and use different types of malware, create malware infections in a controlled virtual environment and clean malware…

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

Didn't find what you were looking for? See also: .

Prerequisites:

The prerequisites for this workshop are attendance of the Security Fundamentals course, or equivalent knowledge.

Course Description:

This 3-day workshop is designed to give delegates a broad overview of both the technical and social engineering aspects of modern malware.

This instructor-led event will combine lectures on the types of malware currently in use on the Internet, how that malware is created and distributed, strategies used for infecting victims, and how malware can be detected and removed. The course also contains exercises in which delegates will inspect and use different types of malware, create malware infections in a controlled virtual environment and clean malware from computers.

This course includes the following modules:

Types of Malware

  • Trojans
  • Adware
  • Spyware
  • Rootkits
  • Multi-stage attacks

Rootkits

  • Function
  • Infection and concealment mechanisms
  • Common rootkits

Exercise: Using a rootkit

  • Performing an ?¢‚Äöá®Ä∫evil maid attack

Trojans

  • Infection mechanisms
  • Multi-stage attacks
  • Common Trojans
  • Multi-stage attacks

Exercise: Infecting a client

  • Malware configuration
  • Creating an infected webpage

Botnets

  • Types of botnets
  • Command & Control strategies
  • Obfuscation techniques
  • The Storm botnet
  • The Koobface botnet

Exercise: Botnets

  • Joining a botnet
  • Analysing botnet traffic

Commercial malware creation

  • Who creates malware
  • Common commercial strategies
  • The Mpack kit
  • Modern kits

Exercise: Malware creation kits

  • Exploring the Mpack kit
  • Infecting a web server

Malware Detection & Removal

  • Common tools
  • Manual cleaning

Exercise: Cleaning Infected Computers

  • Automated tools
  • Manual cleaning

For online live training advice please visit our Learning Advice Centre on our website. Be sure to follow us on Twitter to receive special course offers, news and updates!

There are no reviews yet.

    Share your review

    Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.

    There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.