Malware authors are sometimes talented, sophisticated software developers who understand the methods that security professionals use to detect and prevent malware attacks. This leads them to develop advanced techniques that allow them to escape detection and bypass traditional anti-malware defenses. In this video, Mike Chapple explains three advanced malware concepts: rootkits, polymorphism, and armored viruses.
- [Instructor] Malware authors are sometimes…talented, sophisticated software developers…who understand the methods that security professionals…use to to detect and prevent malware attacks.…This leads them to develop advanced techniques…that allow them to escape detection…and bypass traditional anti-malware defenses.…Let's talk about three advanced malware concepts.…Rootkits, polymorphism, and armored viruses.…The root account is a special superuser…account on a system that provides…unrestricted access to system resources.…
It's normally reserved for system administrators,…but it's also the ultimate goal of many hackers.…Rootkits are a type of malware…that originally were designed for privilege escalation.…A hacker would gain access to a…normal user account on a system,…and then use the rootkit to gain root,…or escalate the normal user access…to unrestricted superuser access.…The term "rootkit" has changed over the years, however.…It is now used to describe software techniques…designed to hide other software on a system.…
- Comparing viruses, worms, and Trojans
- Backdoors and logic bombs
- Understanding the attacker
- Attack types: from denial of service to brute force attacks
- Preventing insider threats
- Wireless attacks
- Understanding cross-site scripting
- Preventing SQL injection
- Social engineering
- Scanning for vulnerabilities
- Penetration testing
- Assessing the impact of vulnerabilities
Skill Level Beginner
IT Security Foundations: Core Conceptswith Lisa Bock1h 13m Beginner
Insights from a Cybersecurity Professionalwith Mike Chapple32m 15s Intermediate
2. Understanding Attackers
3. Understanding Attack Types
4. Wireless Attacks
5. Application Attacks
6. Social Engineering Attacks
7. Vulnerability Scanning and Penetration Testing
8. Impact of Vulnerabilities
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.