From the course: Wireshark: Malware and Forensics
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Understanding malware and cyber threats - Wireshark Tutorial
From the course: Wireshark: Malware and Forensics
Understanding malware and cyber threats
- [Narrator] Over the years, hackers have written and modified many programs, all designed to get in and manipulate a system. Malware has improved in sophistication, and attacks are organized and coordinated. Serious malware makers have progressed to more aggressive attacks, using Trojan horses, root kits, and spyware. Most methods involve programming, yet Some involve social engineering. Expert hackers, target unprotected systems, and may even benefit from accessing an outdated operating system. That is because, even with all the recent news and cyber threats, many are slow to adopt the latest in technology, security patches, updates and operating systems. Let's compare some of the different types of malware. A virus alters the way a computer operates, and can self-replicate and spread to other programs within the system. A virus must have a way to travel to another host, such as an email attachment. A worm is a…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
Exploring cyberattacks and trends5m
-
(Locked)
Understanding malware and cyber threats2m 35s
-
(Locked)
Packet analysis overview2m 59s
-
(Locked)
Outlining the benefits of Wireshark3m 25s
-
(Locked)
Tshark4m 52s
-
(Locked)
Tap into your network4m 40s
-
(Locked)
Create firewall rules3m 53s
-
(Locked)
Challenge: Email forensics3m 37s
-
(Locked)
Response: Email forensics3m 56s
-
-
-
-
-