- Course
Malware Analysis: The Big Picture
Whether you are a board member or front line supervisor, you need to understand the threat malware poses to your company. This course teaches you what malware is, how it infects your systems, and the teams and tools required to minimize the impact.
- Course
Malware Analysis: The Big Picture
Whether you are a board member or front line supervisor, you need to understand the threat malware poses to your company. This course teaches you what malware is, how it infects your systems, and the teams and tools required to minimize the impact.
Get started today
Access this course and other top-rated tech content with one of our business plans.
Try this course for free
Access this course and other top-rated tech content with one of our individual plans.
This course is included in the libraries shown below:
- Security
What you'll learn
Every day a new breach occurs at companies large and small. Some impact tens of millions of customers, destroy a company's reputation, consumer trust, or investor confidence. Some breaches go unnoticed for months or years and quietly leak sensitive information, company secrets, customer data, and more. In this course, Malware Analysis: The Big Picture, you will learn the basics of what malware is, and how it gets into your networks and infects your systems. First, you will delve into what skills, tools, and teams you'll need in place to effectively combat these breaches. Next, you will dive into types of malware analysis and which is best suited for a particular situation. Finally, you will learn about gap analysis; ensuring holes are being filled and resources directed in the proper areas. When you're finished with this course, you'll have the knowledge necessary to make effective decisions regarding what resources are required, legal considerations during and after a breach, and best practices to minimize the effect of malware breaches within your environment.
Malware Analysis: The Big Picture
-
Intro | 45s
-
Who Should Watch This? | 2m 59s
-
What Is Malware? | 3m 17s
-
Why Should You Care? | 2m 50s
-
How Do Systems Get Infected? | 5m 14s
-
Major Forms of Malware | 1m 58s
-
Viruses | 1m 28s
-
Worms | 1m 2s
-
Trojans Horse Programs | 1m 1s
-
Malicious Mobile Code and Blended Attacks | 58s
-
Attacker Tools | 2m 9s
-
Timeline of Noteworthy Malware Outbreaks | 3m 36s
-
Goals of Malware Analysis and Module Review | 2m 52s