User education and awareness can protect the user from Trojans and other malicious attacks. Remain vigilant to prevent unauthorized changes to your system.
- [Narrator] A Trojan is a type of malware that's often…disguised as legitimate software that gets into a system…by tricking a user into downloading…an innocent looking program.…A Trojan avoids detection by setting up a covert channel.…User Education is very important when preventing a Trojan…from infecting your system.…Use caution when opening emails with attachments.…When you get an email with an attachment,…don't automatically download and open that file.…
Although it may seem to come from someone you know,…it's easy to impersonate a sender.…Before opening, contact the sender directly…and ask if they sent you a file before you risk…getting a Trojan.…Before using removable drives, run a scan.…Keep software and operating systems updated.…Use a browser-based firewall.…Use caution when downloading software from websites.…
You need to make sure that you trust the source…and the contents of the file.…If the file contains a Trojan, once you open the file,…you're most likely infected.…If a website has a download page that gives you…
Join cybersecurity expert Lisa Bock in this course as she explains how to identify vulnerabilities in your system, and how to then take countermeasures to prevent unwanted access. Lisa explains how hackers can use a Trojan to penetrate a network and lists the methods and tools that they use. She follows up by sharing how you can perform ethical hacking of your own system to detect areas of susceptibility, so you can address the flaws and defend against attacks. She also discusses rootkits, SSDP amplification attacks, ICMP, and more.
Note: Learning about ethical hacking for Trojans and backdoors is part of the Malware competency from the Certified Ethical Hacker (CEH) body of knowledge.
- Identifying and removing Trojans
- Defending against Trojans
- Blended threats
- SSDP amplification attack
- Disguising FTP, HTTP, and ping
- Using ICMP
- Detecting, removing, and avoiding rootkits