Duration
4 weeksWeekly study
2 hours
Cyber Security Foundations: Common Malware Attacks and Defense Strategies
According to Accenture, malware attacks are the most common type of cyber attack experienced by organizations around the world. These attacks are also the most expensive. Accenture estimates that they cost businesses an average of $2.6 million apiece each year.
The cyber security risks from malware are not limited to ransomware, however. Malware describes any sort of software that is designed to gain unauthorized access to a computer system such as trojan horses and spyware.
Learn how to prevent malware attacks
This cyber security course will guide you to improve your organization’s cyber resilience against malware attacks. You will study examples of malware attacks to understand common threats, and ultimately learn how to prevent malware attacks.
Understand cyber security risks and build cyber resilience
The threat from malware is constantly evolving. New threats continue to enter the market as existing actors’ operations grow more sophisticated. Part of the danger comes from changing business practices. 80% of businesses surveyed by Accenture were adopting new technologies faster than they were able to account for resulting cyber security risks.
The only way to successfully face down this challenge is through building organizational cyber resilience. The first step of malware protection is to know your enemy. This course will explore how to prevent malware attacks by helping you to recognize them.
You’ll learn about common types of malware attacks and different malware strategies, illustrated with case studies of malware attacks in action. You’ll further become familiar with modern malware families, gaining a structural understanding to help you keep pace with evolving threats.
Syllabus
Week 1
Phishing Related Cybersecurity Attacks
Welcome to the Course
In this activity, you will be introduced to your educator and will learn what to expect in the coming two weeks.
Phishing
In this activity, you will learn what phishing is and explore examples to help you identify these attacks and defend against them.
Spear-phishing
In this activity, you will learn about Spear-phishing to ensure that you are able to identify an attack and protect yourself against this specialized form of phishing.
Whaling
In this activity, you will learn about whaling, its importance, and best practices to ensure that you are defended against it.
Smishing
In this activity, you will learn about smishing, explore examples, and cover best practices to defend against this attack.
Vishing
In this activity, you will learn about vishing, explore examples, and cover best practices to defend against this attack.
Summary
You have reached the end of Week 1. Let’s reflect on what you have learned so far.
Week 2
Social Engineering Techniques
Welcome to Week 2
Introduction to the content that will be covered this week.
Dumpster Diving
In this activity, you will learn about dumpster diving to ensure that you know how to identify risks and prevent such an attack.
Tailgating
In this activity, you will learn about tailgating to ensure that you are aware of the tactics used and can defend against them.
Baiting
In this activity, you will learn about baiting, how it can be used in combination with other attacks and how to defend against it.
Impersonation
In this activity you will learn about impersonation to ensure that you are able to protect yourself against it.
Summary
You have reached the end of Week 2! In this activity, you will reflect on what you have learned this week.
Week 3
An Introduction to the World of Malware
Welcome to Week 3
In these steps, you will learn what to expect in the coming week.
Malware in the Real World and the Media
In this activity, you will be introduced to a definition of malware and explore how to recognize key characteristics or indicators of compromise.
What Is a Virus?
In this activity, you will learn more about viruses and how to identify them, before we look at free tools available for identifying malware.
What Are Worms?
In this activity, you will gain an understanding of worms, and their ability to replicate and spread themselves. We will also consider a real-life example.
What Are Trojans?
In this activity, you will gain an understanding of trojans, and how they are used as a "dropper" to get other malware onto a system.
What Is Ransomware?
In this activity, you will gain an understanding of ransomware, as well as learn about more real-world examples.
Summary
In this activity, we’ll take an overview of Week 3, the types of malware that you have learned about so far, and there will also be an opportunity to test your knowledge.
Week 4
Malware Today
Welcome to Week 4
In these steps, you will find out what is in store for the week to come.
Adware: Unclosable Ad Traps
In this step, you will gain an understanding of Adware, the economy behind it, and learn about real-world examples.
Spyware: Invades Devices and Steals Sensitive Information
In this activity, you will gain an understanding of Spyware. We will look at the mercenary companies behind it, as well as learn about more real-world examples.
File-less Malware: Sneaks into Your Running Application
In this activity, we will consider how file-less malware operates, and learn more about real-world instances.
The Hybrid Attack: A Combination of Different Malware
In this activity, we will consider how file-less malware operates, and learn more about real-world instances.
Summary
In this activity, reflect on what you have learned during this course.
Learning on this course
On every step of the course you can meet other learners, share your ideas and join in with active discussions in the comments.
What will you achieve?
By the end of the course, you‘ll be able to...
- Explore the nature of prevalent, and potentially catastrophic, cybersecurity attacks
- Investigate real-world examples of various types of attacks and their outcomes
- Explain methods to discern the various types of attacks and techniques to protect against them
Who is the course for?
This cyber security training is aimed at IT professionals who want to understand how to protect their organization from cyberattacks. This might include data administrators, those working with sensitive data, or those targeting a career in cyber security.
Learning on FutureLearn
Your learning, your rules
- Courses are split into weeks, activities, and steps to help you keep track of your learning
- Learn through a mix of bite-sized videos, long- and short-form articles, audio, and practical activities
- Stay motivated by using the Progress page to keep track of your step completion and assessment scores
Join a global classroom
- Experience the power of social learning, and get inspired by an international network of learners
- Share ideas with your peers and course educators on every step of the course
- Join the conversation by reading, @ing, liking, bookmarking, and replying to comments from others
Map your progress
- As you work through the course, use notifications and the Progress page to guide your learning
- Whenever you’re ready, mark each step as complete, you’re in control
- Complete 90% of course steps and all of the assessments to earn your certificate
Want to know more about learning on FutureLearn? Using FutureLearn