Internet And Network Technologies
Malware Identification, Classification, and Removal Best Practices
Malware Removal: Analyzing an Infected System
Malware Removal: Identifying Malware Types & Classification Approaches
Malware Removal: Remediate an Infected System
Malware Removal: Reporting Findings & Preventing Future Infections

Malware Removal: Analyzing an Infected System

Course Number:
it_cymlcudj_02_enus
Lesson Objectives

Malware Removal: Analyzing an Infected System

  • discover the key concepts covered in this course
  • recognize why malware analysis is important
  • describe the purpose of static malware analysis
  • identify the purpose of dynamic malware analysis
  • recognize common malware characteristics at the Windows API level (registry manipulation, keylogging, HTTP communications, droppers)
  • inspect the static properties of malware
  • perform dynamic malware analysis
  • recognize the impacts of the malware you discover
  • locate open ports and running processes used by malware and terminate the malware process
  • use tools to monitor malware processes
  • use Wireshark to monitor malware network activity
  • inspect malicious code and follow program control flow to recognize decision points during execution
  • summarize the key concepts covered in this course

Overview/Description

Familiarization with the different types of malware analysis and the tools used to analyze malware is a critical skill for IT security professionals. In this course, you'll explore the characteristics of malware and the impact the malware has on the infected system. You'll learn how to identify different malware analysis techniques, such as static and dynamic malware analysis, to discover activities performed by malware. You'll also examine some of the tools used to perform both static and dynamic malware analysis and how to use a disassembler to view malware code.



Target

Prerequisites: none

Malware Removal: Identifying Malware Types & Classification Approaches

Course Number:
it_cymlcudj_01_enus
Lesson Objectives

Malware Removal: Identifying Malware Types & Classification Approaches

  • discover the key concepts covered in this course
  • identify different types of malware attacks
  • describe worm viruses and Trojan viruses and how to prevent them
  • describe ransomware and how to prevent it
  • describe symptoms of an infected system
  • recognize what tools are best to use to fight against malware
  • classify the severity of malware
  • summarize the key concepts covered in this course

Overview/Description

Knowing how to respond to malware incidents is a critical skill for security professionals, and the first step to achieving malware response skills is understanding the types of malware you will face in the field. In this course, you'll explore different types of malware such as worms, Trojan viruses, botnets, ransomware, and rootkits. You'll then round out your knowledge by identifying the different methods used to classify a virus and determine its potential impact.



Target

Prerequisites: none

Malware Removal: Remediate an Infected System

Course Number:
it_cymlcudj_03_enus
Lesson Objectives

Malware Removal: Remediate an Infected System

  • discover the key concepts covered in this course
  • describe symptoms of an infected system
  • recognize best practices for removing malware
  • identify different remediation approaches for various types of malware
  • remove a virus from an infected system
  • use System Restore to remove a virus
  • use the System Restore recovery tool and restore points
  • restore a system backup
  • recognize when to remove vs. complete re-install
  • identify the steps to use when malware makes a system unbootable
  • use system repair to fix boot issues
  • summarize the key concepts covered in this course

Overview/Description

Understanding what tools to use to recover a system after it is infected with malware is a critical skill. In this course, you'll explore the symptoms of virus infected systems and best practices for malware removal. You'll learn about different remediation approaches for different types of malware. You'll also look at some of the tools used to remove and recover systems after they have been infected such as the Windows Malicious Software Removal Tool, the Windows repair options, and how to restore a system image backup.



Target

Prerequisites: none

Malware Removal: Reporting Findings & Preventing Future Infections

Course Number:
it_cymlcudj_04_enus
Lesson Objectives

Malware Removal: Reporting Findings & Preventing Future Infections

  • discover the key concepts covered in this course
  • identify key steps when responding to malware incidents
  • recognize who needs to be informed of malware attacks
  • recognize next steps to ensure you are better protected from future malware attacks
  • identify preparation steps to plan for recovery
  • create a system image to use in recovery after a malware attack
  • summarize the key concepts covered in this course

Overview/Description

Knowing how to respond to a malware incident and who to report the malware incident to is critical to a timely response. In this course, you'll learn key steps for responding to malware incidents, as well as how to identify key persons to report the malware incident to and steps to take to help prevent future malware incidents.



Target

Prerequisites: none

Close Chat Live