课程详情
The key to effectively protecting your systems is understanding the attacks you have to defend them against. Join instructor Malcolm Shore for a hands-on introduction to the many different types of malware that can be used to exploit a target computer.
Explore ethical hacking strategies to:
- Protect your data from different types of malware including viruses, worms, Trojans, and backdoors.
- Identify places where malware hides and detect it to protect your networks and systems against cyberattacks.
- Reverse-engineer malware to understand how it operates.
- Identify malware construction kits called “botnets,” which are used to automate malware.
- Understand the use of cryptography in ransomware.
- Analyze Win32.Sodin, Log4Shell, Black Energy, and Grey Energy droppers and packers.
- Utilize open-source malware analysis tools such as MITRE ATT$CK and Ghidra.
您将获得的技能
获取证书,展示成果
分享学到的内容,成为理想行业的达人,获取证书,展示您在课程中所学的知识。
领英学习
结业证书
-
在领英档案中的“资格认证”版块下展示
-
下载或打印为 PDF,与他人分享
-
以图片形式在线分享,展现您的技能
了解讲师
学员评价
-
-
Henly Kale Dopo
Henly Kale Dopo
Information Security Analyst, Administrator - M365, Documentation (SOPs, DOPs, Security Policies, Training Materials), Network & Systems Admin.
-
Dominic Gonsalves CPPD
Dominic Gonsalves CPPD
Project Management; Rail Communications; Civil Construction; Commercial Renovations; Infrastructure PM; Professional Services; Defence & Cyber…
内容
课程内容
- 边学边练 1 个练习文件
- 知识测验 4 个测验
- 随时随地学习 可在平板电脑和手机上访问