Lisa Bock covers malware, spyware, trojans, rootkits, viruses, and worms. She compares and contrasts viruses and worms, and reviews the phases of attack by a virus or worm.
- [Instructor] Malware is malicious software.…A malware attack can infiltrate the network…and allow unauthorized access to critical information.…We categorize malware in one of five different classes.…Spyware records keystrokes and other activity,…and sends it to a collection site.…Trojans appear as useful programs,…such as games or utilities, but contains malware…that allows hackers to take control…of the victim's computer remotely.…
Rootkits provide a backdoor for illegal access to a host.…Viruses can self-replicate yet need a way to propagate…to other hosts.…And worms are a self-propagating virus…that can spread on its own.…Viruses and worms are two common malicious programs.…A virus is like a human virus,…in that it can self-replicate and spread…to other programs within the system.…The results can be as simple as a new icon on the desktop,…or more serious results, such as disabling…antivirus or destroying files.…
A virus must have a way to travel to another host.…A classic way to propagate a virus…is via an email attachment.…
- Security principles and terms
- SIEM technology
- Common security threats
- Social engineering
- Data loss prevention
- Cryptographic concepts
- Symmetric and asymmetric encryption
- Hash algorithms
- Network topologies, CAN, WAN, and SOHO
- Securing a virtual environment
Skill Level Intermediate
Cisco ICND2 Cert Prep: Switchingwith Russell Long2h 20m Intermediate
CCNA Security (210-260) Cert Prep: 2 Secure Accesswith Lisa Bock1h 25m Intermediate
CCNA Security (210-260) Cert Prep: 3 VPNwith Lisa Bock1h 27m Intermediate
1. Security Principles
2. Common Security Threats
4. Describe Network Topologies
Next steps1m 9s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.