Join Lisa Bock for an in-depth discussion in this video Next steps, part of Ethical Hacking: Viruses and Worms.
- [Lisa] Thank you for watching Ethical Hacking: Viruses and Worms. I've covered an overview of viruses and worms, took a look at virus trends, and how to recognize a virus attack. By now you'll have a better understanding of the different types of viruses, how they hide using polymorphism, and compare botnets, macro, boot, and shell viruses. I covered the various virus stages and how to write a simple virus with various online tools such as Internet Worm Maker Thing and JPS Virus Maker.
We've covered some of the growing threats of ransomware and discussed the various ways to counter and defend against malware. If you're interested in learning more, please check out the other courses in the IT section of our library. New courses are added all the time. If you're interested in learning more about packet analysis, check out my Wireshark course. If you're interested in learning about encryption, check out Essentials of Cryptography. In addition, you might want to check out my Foundations of IT Security series.
If you're ready to continue your journey as an ethical hacker, be sure to watch the other courses in the series. I hope to see you again soon.
Learn more about the Certified Ethical Hacking exam and the benefits of certification at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Understanding viruses and worms
- Recognizing a virus attack
- Identifying different virus types
- Creating a simple virus
- Analyzing malware
- Countering malware