Malware is one of the gravest threats to the security of computers and mobile devices. In this video, learn about the concept of malware management including antivirus, anti-spyware, pop-up blockers, and spam filtering.
- [Instructor] Malware is one of the gravest threats…to the security of computers and mobile devices.…Malware is short for malicious software…and consists of software designed for the sole purpose…of disrupting the confidentiality, integrity,…and availability of information and systems.…There are many different kinds of malware,…but let's talk about four types…that you'll need to know for the exam.…Viruses, worms, Trojan horses, and spyware.…Viruses are malicious code objects…that spread from system to system after some human action.…
They might be transported on removable media…or spread via email attachments, for example.…They carry a malicious payload…that carries out the virus author's intent,…such as stealing data or joining a system to a botnet.…Worms carry payloads similar to those carried by viruses,…but have one important distinction,…they spread on their own power…and don't require user action to move from system to system.…Instead, they scan networks, seeking out vulnerable systems…to compromise.…
Trojan horses pretend to be legitimate pieces…
Note: This course is part of a series releasing throughout 2018. A completed learning path of the series will be available once all the courses are released.
- How IP addresses are assigned and managed
- Multilayer protocols
- VPNs and VPN concentrators
- Designing secure networks
- Firewall management techniques
- Maintaining network availability
- Software defined networking (SDN)
- Port isolation
- Network attacks
- How Wi-Fi networks function
- WPA, WPS, and propagation attacks
- Host-based network security control
Skill Level Advanced
Insights from a Cybersecurity Professionalwith Mike Chapple32m 15s Appropriate for all
1. TCP/IP Networking
2. Network Security Devices
3. Designing Secure Networks
4. Specialized Networking
5. Secure Network Management
6. Virtualized Networks
Port isolation1m 47s
7. Network Attacks
8. Transport Encryption
9. Wireless Networking
10. Host Security
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.