Skip navigation

Disguising FTP, HTTP, and PING

Disguising FTP, HTTP, and PING: Ethical Hacking: Trojans and Backdoors
Disguising FTP, HTTP, and PING: Ethical Hacking: Trojans and Backdoors

Trojans continue to evolve and have significantly advanced in their complexity, methods of infection, and payload. Trojan categories include destructive, banking, and remote-access Trojans. Discover how Trojans can use common protocols such as FTP, HTTP,

Resume Transcript Auto-Scroll
Skill Level Beginner
1h 15m
Duration
44,310
Views
Show More Show Less
Skills covered in this course
Security IT Linux

Continue Assessment

You started this assessment previously and didn't complete it. You can pick up where you left off, or start over.

Start Your Free Trial Now

Start your free trial now, and begin learning software, business and creative skills—anytime, anywhere—with video instruction from recognized industry experts.

Start Your Free Trial Now