Spyware observes computing habits and can also steal sensitive data. Spyware results are often fed into adware to display relevant ads to users through targeted advertising.
- Now that we've talked about social engineering…let's talk about the various forms of malware…that could infect a system.…We're going to talk in this video…about spyware and adware.…Spyware is a modern form of spying…and it is of course malware.…Spyware gets installed and tracks computer usage…unknown to the user.…The user then is unaware of its existence.…It can monitor user computing activity…that's why it's called spyware…and this could be instigated by nation states…it could be by organized crime…it could be by individuals looking…for some kind of profit.…
The types of activities that it might monitor…include thing like calls…for example on a smartphone…it could record audio…so turn on the mic on a device and record audio…the same is true for video.…it can scan through chat logs.…It's not just monitoring what people are doing…in real time but what they've already done as well.…There are legitimate uses of this in some cases…such as the gathering of performance metrics…to ensure that the user experience…let's say for a web app…
- Malware types
- Getting Endpoint Protection up and running
- Deploying the SCEP Windows client
- Removing malware on a SCEP client
- Configuring custom policies
- Planning an update strategy
- Windows firewall settings
- Using PowerShell cmdlets for monitoring
Skill Level Beginner
1. Defining Malware Types
2 Getting Endpoint Protection Up and Running
3. Endpoint Protection Policies
4. Monitoring Endpoint Protection
Next steps1m 11s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.