Home      Signup      Courses      Sign-In
 

  Please login to Enroll or Access the course.  
  Summary Page: Certified Ethical Hacker (CEH): Malware

Certified Ethical Hacker (CEH): Malware






Malware is malicious software, used by attackers in various ways including disruption, information gathering, and gaining access. In this course we look at how malware is created, the attack vectors, and what countermeasures are available. An ethical hacker is a person who attacks an organization's security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. In this course we look at malware, how it is created, the attack vectors, and what countermeasures are available. This course is the sixth in a series of courses which can used in preparation for the Certified Ethical Hacker 312-50 exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures course materials and labs.


Network and information security professionals


2.0

Trojans and Backdoors

  • recognize techniques for getting trojans to evade antivirus software
  • match the trojan to its type
  • identify the purpose of specific trojans
  • identify the tools used to detect trojans by scanning for suspicious open ports
  • identify trojan countermeasures
  • Viruses and Worms

  • recognize the definition and characteristics of a virus
  • identify the characteristics of a worm
  • identify the purpose and characteristics of Sheep dip

  • sp_ceth_a06_it_enus

     

     
    Home      Signup      Courses      Sign-In
     

      UN Global Alliance for ICT and Development ESKILLS360 IS A UN GAID FLAGSHIP INITIATIVE