Join Lisa Bock for an in-depth discussion in this video What you should know, part of Ethical Hacking: Trojans and Backdoors.
- [Instructor] This course is an intermediate course intended for IT security professionals, network administrators, managers, students, teachers, or anyone with an interest in learning more about Trojan and Trojan behavior and rootkits. How they work, common behavior and how to detect, counter, remove and defend. Participants should have a solid foundation of security concepts and knowledge on operating systems, applications, browsers, encryption and have an interest in the subject.
Join cybersecurity expert Lisa Bock in this course as she explains how to identify vulnerabilities in your system, and how to then take countermeasures to prevent unwanted access. Lisa explains how hackers can use a Trojan to penetrate a network and lists the methods and tools that they use. She follows up by sharing how you can perform ethical hacking of your own system to detect areas of susceptibility, so you can address the flaws and defend against attacks. She also discusses rootkits, SSDP amplification attacks, ICMP, and more.
Note: Learning about ethical hacking for Trojans and backdoors is part of the Malware competency from the Certified Ethical Hacker (CEH) body of knowledge.
- Identifying and removing Trojans
- Defending against Trojans
- Blended threats
- SSDP amplification attack
- Disguising FTP, HTTP, and ping
- Using ICMP
- Detecting, removing, and avoiding rootkits