Course Outline

Introduction

What is Malware?

  • Types of malware
  • How malware works
  • The lifecycle of malware

The Dangers of Malware

  • Who creates malware?
  • How malware is created
  • Case study: ILOVEYOU

Software Choices in the Face of Malware

  • Windows, Mac and Linux
  • Android and iPhone
  • Anti-malware software

How to Protect against Malware

  • Awareness as the foundation
  • Procedural measures
  • Technological measures
  • Detecting malware
  • Preventing malware

Malware in the Workplace

  • Advanced visibility tools
  • Detecting malware in a corporate networks
  • Costs of fighting malware

Malware Trends

  • What is cyber crime?
  • ROI of malware
  • Attacks on organizations and institutions

Summary and Conclusion

Requirements

  • Basic understanding of IT
  • Basic understanding of cyber security

Audience

  • Non-technical persons
  7 Hours
 

Testimonials

Related Courses

Certified Chief Information Security Officer (CCISO)

  35 hours

Certified Ethical Hacker

  35 hours

Standard Java Security

  14 hours

Java and Web Application Security

  21 hours

Advanced Java Security

  21 hours

Advanced Java, JEE and Web Application Security

  28 hours

C/C++ Secure Coding

  21 hours

Microsoft SDL Core

  14 hours

.NET, C# and ASP.NET Security Development

  14 hours

Certificate of Cloud Security Knowledge

  14 hours

Fundamentals of Corporate Cyber Warfare

  14 hours

Open Source Cyber Intelligence - Introduction

  7 hours

Open Source Intelligence (OSINT) Advanced

  21 hours