Ethical Hacking: Malware Threats

Pluralsight
Course Summary
This course will take you deep into the dark alley of how malware is used and deployed. We'll also dive into how Trojans and backdoors work. We'll look at what their purpose is, the signs that you have one, and how attackers cleverly hide them. We'll then spend some time showing you how these "little soldiers" make their way into your network and system. We'll discuss the different types of Trojans and how to detect and remove those buggers. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking
-
+
Course Description
The easiest way to get into a system or network is to get someone to let us in. Do you pirate software, movies, music, or heaven forbid - an operating system? I'm about 99.999% sure you've already been pwned. Malware is specifically designed to gain access or damage systems without the knowledge of the victim. Malware is on the rise due to the sheer volume of new types that are easily created daily, and the money that can be made through organized Internet crime. We'll talk about the various malware types, including viruses, Trojans, and worms. Now, we won't leave you in despair, we'll also talk about countermeasures and ways to detect these bad boys. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking
-
+
Course Syllabus
The Hard Truth Behind Malware- 26m 22s
—The Hard Truth Behind Malware 4m 43s
—What Is Malware? 4m 0s
—The Numbers Behind Malware 5m 1s
—How Does Malware Get In? 11m 17s
—Summary 1m 19sWhat's a Trojan?- 25m 47s
—What's a Trojan? 1m 36s
—Trojans up Close 4m 10s
—What's the Goal? 6m 31s
—How Trojans Communicate and Hide 6m 33s
—Clues You Have a Trojan 5m 12s
—Summary 1m 43sTrojan Infections- 29m 4sTypes of Trojans- 26m 22sVirus and Worms- 44m 39sDetecting Malware- 34m 2sCountermeasures- 25m 50s