Tricking victims into divulging sensitive information is often accomplished via phishing, often in the form a malicious email message that looks legitimate. Ransomware can encrypt data demand a ransom payment in bitcoins, but there is no guarantee of decryption keys being provided.
- [Narrator] In the last video, we talked about viruses,…Trojans, and Rootkits.…Now we're going to focus on different forms of malware,…specifically phishing, with ph, and ransomware.…Ransomware has really seen a large surgence…over the last couple of years.…So, we'll focus on that as well.…Phishing is designed to trick victims…into revealing secrets.…So, it's related, then, to social engineering,…but you're going to hear terms in the industry,…things like spear phishing where we've got targeted…social engineering, or deception methods…that are trying to trick certain types of individuals…into revealing certain types of information…such as IT administrators, trying to trick them…into revealing passwords for network appliances.…
Ransomware, on the other hand, infects a system…such that the system won't boot up properly…until a ransom is paid.…Or, the most common form of ransomware…actually encrypts data files until the ransom is paid.…Let's talk about phishing.…Phishing is a form of social engineering…and it lures victims to reveal secrets…
- Malware types
- Getting Endpoint Protection up and running
- Deploying the SCEP Windows client
- Removing malware on a SCEP client
- Configuring custom policies
- Planning an update strategy
- Windows firewall settings
- Using PowerShell cmdlets for monitoring
Skill Level Beginner
1. Defining Malware Types
2 Getting Endpoint Protection Up and Running
3. Endpoint Protection Policies
4. Monitoring Endpoint Protection
Next steps1m 11s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.