Understanding and Managing the threat of Malware
Starting dates and places
This product does not have fixed starting dates and/or places.
Description
Prerequisites:
The prerequisites for this workshop are attendance of the Security Fundamentals course, or equivalent knowledge.Course Description:
This 3-day workshop is designed to give delegates a broad overview of both the technical and social engineering aspects of modern malware.
This instructor-led event will combine lectures on the types of malware currently in use on the Internet, how that malware is created and distributed, strategies used for infecting victims, and how malware can be detected and removed. The course also contains exercises in which delegates will inspect and use different types of malware, create malware infections in a controlled virtual environment and clean malware…
Frequently asked questions
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
Prerequisites:
The prerequisites for this workshop are attendance of the Security Fundamentals course, or equivalent knowledge.Course Description:
This 3-day workshop is designed to give delegates a broad overview of both the technical and social engineering aspects of modern malware.
This instructor-led event will combine lectures on the types of malware currently in use on the Internet, how that malware is created and distributed, strategies used for infecting victims, and how malware can be detected and removed. The course also contains exercises in which delegates will inspect and use different types of malware, create malware infections in a controlled virtual environment and clean malware from computers.
This course includes the following modules:
Types of Malware
- Trojans
- Adware
- Spyware
- Rootkits
- Multi-stage attacks
Rootkits
- Function
- Infection and concealment mechanisms
- Common rootkits
Exercise: Using a rootkit
- Performing an ?¢‚Äöá®Ä∫evil maid attack
Trojans
- Infection mechanisms
- Multi-stage attacks
- Common Trojans
- Multi-stage attacks
Exercise: Infecting a client
- Malware configuration
- Creating an infected webpage
Botnets
- Types of botnets
- Command & Control strategies
- Obfuscation techniques
- The Storm botnet
- The Koobface botnet
Exercise: Botnets
- Joining a botnet
- Analysing botnet traffic
Commercial malware creation
- Who creates malware
- Common commercial strategies
- The Mpack kit
- Modern kits
Exercise: Malware creation kits
- Exploring the Mpack kit
- Infecting a web server
Malware Detection & Removal
- Common tools
- Manual cleaning
Exercise: Cleaning Infected Computers
- Automated tools
- Manual cleaning
For online live training advice please visit our Learning Advice Centre on our website. Be sure to follow us on Twitter to receive special course offers, news and updates!
Share your review
Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.