Duration: 1h 25m | Author(s): Skylar Simmons | Video: 1920x1080, 48kHz | 399.99 MB
Genre: eLearning | Language: English
We have been seeing increasing news stories about breaches, hacks, and various cyberattacks, but what does it mean in the real world? How does it impact me?
This course aims to look at modern malware families and techniques, as well as how they are being used in the "real world."
By the end of this course, you will learn some basic activities that you can perform at home to reduce your risk.
Table of contents
Chapter 1: Introduction to Virus
Course Overview
Malware in the Media and Real-world
Chapter 2: Worm: Replicates to Spread Itself
Worms: Understanding Their Behavior and Operation
Worms in the Real World - Stuxnet
Chapter 3: Malicious Intentions of Trojan
Trojans: Understanding Their Behaviors and Operation
Trojans in the Real World - BEAST
Chapter 4: Ransomware: Threatens to Publish a Victim's Data in Return of a Handsome Ransom
Ransomware: Understanding Their Behaviors and Operation
Ransomware in the Real World - NotPetya
Chapter 5: Adware: The "Unclosable" Ad Traps
Adware: Understanding Its Behavior and Operation
Adware in the Real World - Fireball
Chapter 6: Spyware: Invades the Device and Steals the Sensitive Information
Spyware: Understanding Its Behavior and Operations
Spyware in the Real World - FinFisher
Chapter 7: File-less Malware: Sneaks into Your Running Application
File-less Malware: What Is It and How Does It Work?
File-less Malware in the Real World - GrandCrab
Chapter 8: The Hybrid Attack: Combination of Different Malwares
Hybrid Malware - What Is It and What Are the Common Techniques?
Chapter 9: Course Conclusion
Summarizing the Course and Key Takeaways
Buy Premium From My Links To Get Resumable Support,Max Speed & Support Me