FREE

Weʼre Giving Away an ISO 50001 Handbook, Quality in Project Management and Quality Costing Video
WWISE


    Cyber Security: Malware

    Certificate Approved by WWISE
    Course Duration
    124:73 Minutes
    12 months access

    Course Summary

    The security of an organisation is of the utmost importance and every member of the organisation’s staff plays a vital role in defending against cyber threats. One of the best ways to protect the organisation is to institute a company-wide security-awareness training initiative. This course is a complete foundational security awareness training program that covers a wide array of topics for nearly every type of end-user and learner level. The content is designed to allow organisations to be able to provide a comprehensive training program to help them protect their information assets against threats.

    Who Should Attend?

    Software developers, information security professionals, incident responders, computer security researchers, corporate investigators and others who need to understand how malware operates and the processes involved in performing malware analysis.

    Course Objectives

    • After completing this course, learners should be able to: Quickly perform a malware autopsy using a variety of techniques and tools without running the malware.
    • Analyse running malware by observing file system changes, function calls, network communications and other indicators.

    Course Modules

    1. Need to Know: Malware 
    2. Malware 
    3. Malware Brief 
    4. Ransomware 
    5. Worked Episode 6: Demons 
    6. Intelligent Personal Assistant 
    7. Malware for Managers 
    8. Malware for Executives 
    9. Malware and PHI 
    10. Malware and PHI for Managers 
    11. Malware and PHI for Executives 
    12. Malware for Financial Institutions 
    13. Malware for Educators 
    14. Ransomware and HIPAA 
    15. Insufficient Logging and Monitoring 
    16. Insufficient Attack Protection 
    17. Check (Automatic Updates) 
    18. OWASP A6 – Security Misconfiguration 
    19. OWASP A9 – Using Components with Known Vulnerabilities 
    20. OWASP A10 – Insufficient Logging and Monitoring 
    21. Vulnerability Management 
    22. Using Components with Known Vulnerabilities 
    23. Security Misconfiguration 
    24. Secure Configuration 
    25. Managing Software Assets 
    26. Updates and Patches (Video) 
    27. Antivirus (Video) 
    28. Intellectual Property 
    29. Intellectual Property Rights (Video) 
    30. Appropriate Use of Software (Video) 
    31. Software Licensing (Video) 
    32. EAL Malware 

    Benefits

    • Helps incident responders and security analysts
    • Pragmatically triage incidents by level of severity
    • Uncover hidden indicators of compromise (IOCs) that should be blocked
    • Improve the efficacy of IOC alerts and notifications

    Certification

    We’ve made it simple to access your interactive assessments directly in your online learning journey, by embedding them as part of the module.

    Assessment