Course Outline
Introduction
What is Malware?
- Types of malware
- How malware works
- The lifecycle of malware
The Dangers of Malware
- Who creates malware?
- How malware is created
- Case study: ILOVEYOU
Software Choices in the Face of Malware
- Windows, Mac and Linux
- Android and iPhone
- Anti-malware software
How to Protect against Malware
- Awareness as the foundation
- Procedural measures
- Technological measures
- Detecting malware
- Preventing malware
Malware in the Workplace
- Advanced visibility tools
- Detecting malware in a corporate networks
- Costs of fighting malware
Malware Trends
- What is cyber crime?
- ROI of malware
- Attacks on organizations and institutions
Summary and Conclusion
Requirements
- Basic understanding of IT
- Basic understanding of cyber security
Audience
- Non-technical persons
Testimonials (6)
Overview of Risk topics and preparing for exam
Leszek - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CRISC - Certified in Risk and Information Systems Control
Lap Qradar
Sutthikan Noisombat - NTT
Course - IBM Qradar SIEM: Beginner to Advanced
Instructor delivery of information; At the end of the day it was Gaurav who pulled off this topic focusing on building strong fundamentals and devising a methodology to be retained with us
Raheal Akhtar - Dubai Government Human Resources Department
Course - Certified Ethical Hacker
Accessing tools and being able to ask questions to someone friendly who I felt wouldn't judge me
Kiara
Course - Open Source Cyber Intelligence - Introduction
The simple explanation of the trainer
Mohammed salem - Palestinian Police
Course - Open Source Intelligence (OSINT) Advanced
A wide range of knowledge of the lecturer.