Malware is often the first line of attack. Learn how to detect and neutralize malware such as viruses and worms in this course from our Certified Ethical Hacker test prep series.
- [Lisa] When you hear the term malware or get a warning from your computer system, "Caution! This file contains malicious content," does it make you wonder just what is malware, and how can I protect my computer? Hello, my name is Lisa Bock, and I'm a security ambassador. In this course, I'll cover concepts such as comparing viruses and worms, which are commonly used during the first phase in launching an attack against a system. I'll take a look at virus trends and how to recognize an attack.
By the end of this course, you'll understand the different types of viruses, such as macro, boot, shell, and cluster viruses. In addition, I'll cover the treat of polymorphism and overwriting parasitic viruses. I'll show you some of the tools used to create a simple virus, such as the Internet Worm Maker Thing, and discover JPS Virus Maker. We'll look at the growing threat of ransomware and discuss different ways to counter and defend against malware.
This course is part of the ethical hacking series. Are you ready? Let's get started.
Learn more about the Certified Ethical Hacking exam and the benefits of certification at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Understanding viruses and worms
- Recognizing a virus attack
- Identifying different virus types
- Creating a simple virus
- Analyzing malware
- Countering malware