Ethical Hacking: Malware Threats

This course will take you deep into the dark alley of how malware is used and deployed. We'll also dive into how Trojans and backdoors work. We'll look at what their purpose is, the signs that you have one, and how attackers cleverly hide them. We'll then spend some time showing you how these "little soldiers" make their way into your network and system. We'll discuss the different types of Trojans and how to detect and remove those buggers. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking
Course info
Rating
(146)
Level
Beginner
Updated
December 1, 2015
Duration
3h 32m
Table of contents
Description
Course info
Rating
(146)
Level
Beginner
Updated
December 1, 2015
Duration
3h 32m
Description

The easiest way to get into a system or network is to get someone to let us in. Do you pirate software, movies, music, or heaven forbid - an operating system? I'm about 99.999% sure you've already been pwned. Malware is specifically designed to gain access or damage systems without the knowledge of the victim. Malware is on the rise due to the sheer volume of new types that are easily created daily, and the money that can be made through organized Internet crime. We'll talk about the various malware types, including viruses, Trojans, and worms. Now, we won't leave you in despair, we'll also talk about countermeasures and ways to detect these bad boys. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking

About the author
About the author

Dale Meredith received his Certified Ethical Hacker and Certified EC-Counsel Instructor certifications back in 2006, as well as being a Microsoft Certified Trainer since 1998 (yes we had computers back then). Dale takes great pride in helping students comprehend and simplify complex IT concepts.

More from the author
Secure Software Development
Beginner
3h 15m
12 Sep 2017
More courses by Dale Meredith