This course was created and produced by Mentor Source, Inc. We are honored to host this training in our library.
- What is malware?
- How does malware work?
- Risks of malware
- Malware examples
- Malware protection
Skill Level Beginner
- [Serge] Malicious software, malware, is a common threat and reality of everyday life for security professionals and the general public. Take for instance, something as simple as the Spam folder in your email box, a portion of the emails contained within will point to a malicious website, that will actively try to infect your machine with malware. To start the infection process, all you have to do is click the link. If your browser or client software has a known vulnerability that the malware's able to exploit, then your machine may become infected. But what then? Will your hard drive become encrypted, or maybe your files deleted, or your credentials compromised? Perhaps your contact list will be spammed, or your bank account drained, or your phone video tapped, or DNS hijacked.
Or will your system become unstable, or maybe your company will feel the pain? Do you get the point? There's a saying in the information security world, once an attacker is able to get their code to execute on your computer, it is no longer your computer. This course will discuss the ends and outs of malware, from what it is, to how it works, and some ways that you can protect yourself and your devices. Hi, my name is Serge Borso, the CEO of SpyderSec. Spydersec is an information security consulting organization, specializing in penetration testing services.
We also offer phishing solutions, discovery scanning, and educational and awareness training. Throughout this course I will be talking a lot about malicious software, while sharing my experience of dealing with it, as well as providing information to learn more about different types of malware, implications and precautions that can be taken to protect yourself and your organization. Some things that you need to know before we start this journey, as it pertains to your own background and skill level, are the intended audience and depth of the material. It is expected that people taking this course are at an intermediate skill level, in terms of general IT knowledge.
As for depth, this course will go into some depth, regarding malicious software, short of decompiling samples, while beyond basic knowledge of antivirus or AV solutions. The material being discussed will be applicable to both home and the workplace, mainly due to the commonality of the concepts being discussed and the similarities and threats. The topics of this course, range from defining malware and understanding how it works, to determining the risks associated with malware and how we can protect ourselves and our organizations from such threats.
At the end of the course, we will put all of the information discussed together, in order to form a cohesive understanding of how threat actors operate, motivations behind creating and inseminating malware, and what we can do to stay secure.