MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

Ethical Hacking: Malware Threats

Course Summary

This course will take you deep into the dark alley of how malware is used and deployed. We'll also dive into how Trojans and backdoors work. We'll look at what their purpose is, the signs that you have one, and how attackers cleverly hide them. We'll then spend some time showing you how these "little soldiers" make their way into your network and system. We'll discuss the different types of Trojans and how to detect and remove those buggers. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking


  • +

    Course Syllabus

    The Hard Truth Behind Malware
    - 26m 22s

    —The Hard Truth Behind Malware 4m 43s
    —What Is Malware? 4m 0s
    —The Numbers Behind Malware 5m 1s
    —How Does Malware Get In? 11m 17s
    —Summary 1m 19s
    What's a Trojan?
    - 25m 47s

    —What's a Trojan? 1m 36s
    —Trojans up Close 4m 10s
    —What's the Goal? 6m 31s
    —How Trojans Communicate and Hide 6m 33s
    —Clues You Have a Trojan 5m 12s
    —Summary 1m 43s
    Trojan Infections
    - 29m 4s
    Types of Trojans
    - 26m 22s
    Virus and Worms
    - 44m 39s
    Detecting Malware
    - 34m 2s
    Countermeasures
    - 25m 50s


Course Fee:
USD 29

Course Type:

Self-Study

Course Status:

Active

Workload:

1 - 4 hours / week

Attended this course?

Back to Top

Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top