5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

Certification     EC-Council     Certified Ethical Hacker (CEH)     Certified Ethical Hacker (CEH) v11

Malware is a common threat used to attack, compromise, and even destroy computer systems. In this course, you'll learn about common malware types and components so you can properly defend against malicious software. Then, you'll move on to explore Advanced Persistent Threats, which are becoming more and more of a danger due to their sophisticated malware. You'll examine the malicious software version of the Trojan Horse, as well as the different types of trojans, deployment methods, construction, and techniques for evading anti-virus detection. Finally, you'll learn about viruses and worms, including concepts, types, and characteristics. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.



Objectives

CEH v11: Malware, Threats, Trojans, & Viruses

  • identify malware components used to download the malicious code
  • recognize the components of malicious software
  • identify the characteristics of an APT attack
  • identify the phases of an APT attack
  • recognize the purpose of APT groups
  • identify the different types of trojan malware
  • identify the malware deployment types
  • identify the trojan type that includes running the real program in addition to the malicious code
  • recognize techniques used to avoid trojan detection
  • identify malicious software that requires human interaction in order to replicate to a system
  • identify the phases of the virus lifecycle
  • recognize the malware type that self-replicates