• EC-council logo

Cyber Security Foundations: Common Malware Attacks and Defense Strategies

Discover how to defend yourself against evolving cyber attacks in this cyber security training focused on malware protection.

Cyber Security Foundations: Common Malware Attacks and Defense Strategies
  • Duration

    4 weeks
  • Weekly study

    2 hours
  • 100% online

    Learn at your own paceHow it works
  • Included in an ExpertTrack

    Course 2 of 4
  • Get full ExpertTrack access

    $39/monthFind out more

According to Accenture, malware attacks are the most common type of cyber attack experienced by organizations around the world. These attacks are also the most expensive. Accenture estimates that they cost businesses an average of $2.6 million apiece each year.

The cyber security risks from malware are not limited to ransomware, however. Malware describes any sort of software that is designed to gain unauthorized access to a computer system such as trojan horses and spyware.

Learn how to prevent malware attacks

This cyber security course will guide you to improve your organization’s cyber resilience against malware attacks. You will study examples of malware attacks to understand common threats, and ultimately learn how to prevent malware attacks.

Understand cyber security risks and build cyber resilience

The threat from malware is constantly evolving. New threats continue to enter the market as existing actors’ operations grow more sophisticated. Part of the danger comes from changing business practices. 80% of businesses surveyed by Accenture were adopting new technologies faster than they were able to account for resulting cyber security risks.

The only way to successfully face down this challenge is through building organizational cyber resilience. The first step of malware protection is to know your enemy. This course will explore how to prevent malware attacks by helping you to recognize them.

You’ll learn about common types of malware attacks and different malware strategies, illustrated with case studies of malware attacks in action. You’ll further become familiar with modern malware families, gaining a structural understanding to help you keep pace with evolving threats.

Syllabus

  • Week 1

    Phishing Related Cybersecurity Attacks

    • Welcome to the Course

      In this activity, you will be introduced to your educator and will learn what to expect in the coming two weeks.

    • Phishing

      In this activity, you will learn what phishing is and explore examples to help you identify these attacks and defend against them.

    • Spear-phishing

      In this activity, you will learn about Spear-phishing to ensure that you are able to identify an attack and protect yourself against this specialized form of phishing.

    • Whaling

      In this activity, you will learn about whaling, its importance, and best practices to ensure that you are defended against it.

    • Smishing

      In this activity, you will learn about smishing, explore examples, and cover best practices to defend against this attack.

    • Vishing

      In this activity, you will learn about vishing, explore examples, and cover best practices to defend against this attack.

    • Summary

      You have reached the end of Week 1. Let’s reflect on what you have learned so far.

  • Week 2

    Social Engineering Techniques

    • Welcome to Week 2

      Introduction to the content that will be covered this week.

    • Dumpster Diving

      In this activity, you will learn about dumpster diving to ensure that you know how to identify risks and prevent such an attack.

    • Tailgating

      In this activity, you will learn about tailgating to ensure that you are aware of the tactics used and can defend against them.

    • Baiting

      In this activity, you will learn about baiting, how it can be used in combination with other attacks and how to defend against it.

    • Impersonation

      In this activity you will learn about impersonation to ensure that you are able to protect yourself against it.

    • Summary

      You have reached the end of Week 2! In this activity, you will reflect on what you have learned this week.

  • Week 3

    An Introduction to the World of Malware

    • Welcome to Week 3

      In these steps, you will learn what to expect in the coming week.

    • Malware in the Real World and the Media

      In this activity, you will be introduced to a definition of malware and explore how to recognize key characteristics or indicators of compromise.

    • What Is a Virus?

      In this activity, you will learn more about viruses and how to identify them, before we look at free tools available for identifying malware.

    • What Are Worms?

      In this activity, you will gain an understanding of worms, and their ability to replicate and spread themselves. We will also consider a real-life example.

    • What Are Trojans?

      In this activity, you will gain an understanding of trojans, and how they are used as a "dropper" to get other malware onto a system.

    • What Is Ransomware?

      In this activity, you will gain an understanding of ransomware, as well as learn about more real-world examples.

    • Summary

      In this activity, we’ll take an overview of Week 3, the types of malware that you have learned about so far, and there will also be an opportunity to test your knowledge.

  • Week 4

    Malware Today

    • Welcome to Week 4

      In these steps, you will find out what is in store for the week to come.

    • Adware: Unclosable Ad Traps

      In this step, you will gain an understanding of Adware, the economy behind it, and learn about real-world examples.

    • Spyware: Invades Devices and Steals Sensitive Information

      In this activity, you will gain an understanding of Spyware. We will look at the mercenary companies behind it, as well as learn about more real-world examples.

    • File-less Malware: Sneaks into Your Running Application

      In this activity, we will consider how file-less malware operates, and learn more about real-world instances.

    • The Hybrid Attack: A Combination of Different Malware

      In this activity, we will consider how file-less malware operates, and learn more about real-world instances.

    • Summary

      In this activity, reflect on what you have learned during this course.

Prove you're job ready

Highlight the new, job-relevant skills you’ve gained and supplement existing qualifications with a hard-earned, industry-specific digital certificate – plus one for every course within your ExpertTrack.

  • Learn the latest in your chosen industry or subject.
  • Complete each course and pass assessments.
  • Receive certificates validated by the educating organisation.
  • Impress employers with learning outcomes you can add to your CV.
  • Make your career dreams a reality.

Download a PDF

Learning on this course

You can take this self-guided course and learn at your own pace. On every step of the course you can meet other learners, share your ideas and join in with active discussions in the comments.

What will you achieve?

By the end of the course, you‘ll be able to...

  • Explore the nature of prevalent, and potentially catastrophic, cybersecurity attacks
  • Investigate real-world examples of various types of attacks and their outcomes
  • Explain methods to discern the various types of attacks and techniques to protect against them

Who is the course for?

This cyber security training is aimed at IT professionals who want to understand how to protect their organization from cyberattacks. This might include data administrators, those working with sensitive data, or those targeting a career in cyber security.

Who developed the course?

EC-Council

International Council of E-Commerce Consultants, also known as EC-Council, is the world’s largest cyber security technical certification body.

About this ExpertTrack

Discover why cyber security is important, and how to build organizational cyber resilience in these four cyber security courses.

Start learning today - free 7-day trial

After your free trial you can:

  • Pay $39 per month to keep learning online
  • Have complete control over your subscription; you can cancel any time
  • Work at your own pace and set your own deadlines at every stage
  • Only pay while you’re learning; the subscription will cancel automatically when you finish
  • Complete online assessments to test your knowledge and prove your skills
  • Earn digital course certificates and a final award that you can share online, with potential employers, and your professional network
  • Keep access to the content of courses you complete even after your subscription ends

Learning on FutureLearn

Your learning, your rules

  • Courses are split into weeks, activities, and steps, but you can complete them as quickly or slowly as you like
  • Learn through a mix of bite-sized videos, long- and short-form articles, audio, and practical activities
  • Stay motivated by using the Progress page to keep track of your step completion and assessment scores

Join a global classroom

  • Experience the power of social learning, and get inspired by an international network of learners
  • Share ideas with your peers and course educators on every step of the course
  • Join the conversation by reading, @ing, liking, bookmarking, and replying to comments from others

Map your progress

  • As you work through the course, use notifications and the Progress page to guide your learning
  • Whenever you’re ready, mark each step as complete, you’re in control
  • Complete 90% of course steps and all of the assessments to earn your certificate

Want to know more about learning on FutureLearn? Using FutureLearn

Do you know someone who'd love this course? Tell them about it...