• EC-council logo
New

Cyber Security Foundations: Common Malware Attacks and Defense Strategies

Discover how to defend yourself against evolving cyber attacks in this cyber security training focused on malware protection.

Cyber Security Foundations: Common Malware Attacks and Defense Strategies
  • Duration4 weeks
  • Weekly study2 hours
  • 100% onlineTry this course for free
  • Included in an ExpertTrackCourse 2 of 4
  • Get full ExpertTrack access$39/month

According to Accenture, malware attacks are the most common type of cyber attack experienced by organizations around the world. These attacks are also the most expensive. Accenture estimates that they cost businesses an average of $2.6 million apiece each year.

The cyber security risks from malware are not limited to ransomware, however. Malware describes any sort of software that is designed to gain unauthorized access to a computer system such as trojan horses and spyware.

Learn how to prevent malware attacks

This cyber security course will guide you to improve your organization’s cyber resilience against malware attacks. You will study examples of malware attacks to understand common threats, and ultimately learn how to prevent malware attacks.

Understand cyber security risks and build cyber resilience

The threat from malware is constantly evolving. New threats continue to enter the market as existing actors’ operations grow more sophisticated. Part of the danger comes from changing business practices. 80% of businesses surveyed by Accenture were adopting new technologies faster than they were able to account for resulting cyber security risks.

The only way to successfully face down this challenge is through building organizational cyber resilience. The first step of malware protection is to know your enemy. This course will explore how to prevent malware attacks by helping you to recognize them.

You’ll learn about common types of malware attacks and different malware strategies, illustrated with case studies of malware attacks in action. You’ll further become familiar with modern malware families, gaining a structural understanding to help you keep pace with evolving threats.

Syllabus

  • Week 1

    Phishing Related Cybersecurity Attacks

    • Welcome to the Course

      In this activity, you will be introduced to your educator and will learn what to expect in the coming two weeks.

    • Phishing

      In this activity, you will learn what phishing is and explore examples to help you identify these attacks and defend against them.

    • Spear-phishing

      In this activity, you will learn about Spear-phishing to ensure that you are able to identify an attack and protect yourself against this specialized form of phishing.

    • Whaling

      In this activity, you will learn about whaling, its importance, and best practices to ensure that you are defended against it.

    • Smishing

      In this activity, you will learn about smishing, explore examples, and cover best practices to defend against this attack.

    • Vishing

      In this activity, you will learn about vishing, explore examples, and cover best practices to defend against this attack.

    • Summary

      You have reached the end of Week 1. Let’s reflect on what you have learned so far.

  • Week 2

    Social Engineering Techniques

    • Welcome to Week 2

      Introduction to the content that will be covered this week.

    • Dumpster Diving

      In this activity, you will learn about dumpster diving to ensure that you know how to identify risks and prevent such an attack.

    • Tailgating

      In this activity, you will learn about tailgating to ensure that you are aware of the tactics used and can defend against them.

    • Baiting

      In this activity, you will learn about baiting, how it can be used in combination with other attacks and how to defend against it.

    • Impersonation

      In this activity you will learn about impersonation to ensure that you are able to protect yourself against it.

    • Summary

      You have reached the end of Week 2! In this activity, you will reflect on what you have learned this week.

  • Week 3

    An Introduction to the World of Malware

    • Welcome to Week 3

      In these steps, you will learn what to expect in the coming week.

    • Malware in the Real World and the Media

      In this activity, you will be introduced to a definition of malware and explore how to recognize key characteristics or indicators of compromise.

    • What Is a Virus?

      In this activity, you will learn more about viruses and how to identify them, before we look at free tools available for identifying malware.

    • What Are Worms?

      In this activity, you will gain an understanding of worms, and their ability to replicate and spread themselves. We will also consider a real-life example.

    • What Are Trojans?

      In this activity, you will gain an understanding of trojans, and how they are used as a "dropper" to get other malware onto a system.

    • What Is Ransomware?

      In this activity, you will gain an understanding of ransomware, as well as learn about more real-world examples.

    • Summary

      In this activity, we’ll take an overview of Week 3, the types of malware that you have learned about so far, and there will also be an opportunity to test your knowledge.

  • Week 4

    Malware Today

    • Welcome to Week 4

      In these steps, you will find out what is in store for the week to come.

    • Adware: Unclosable Ad Traps

      In this step, you will gain an understanding of Adware, the economy behind it, and learn about real-world examples.

    • Spyware: Invades Devices and Steals Sensitive Information

      In this activity, you will gain an understanding of Spyware. We will look at the mercenary companies behind it, as well as learn about more real-world examples.

    • File-less Malware: Sneaks into Your Running Application

      In this activity, we will consider how file-less malware operates, and learn more about real-world instances.

    • The Hybrid Attack: A Combination of Different Malware

      In this activity, we will consider how file-less malware operates, and learn more about real-world instances.

    • Summary

      In this activity, reflect on what you have learned during this course.

What will you achieve?

By the end of the course, you‘ll be able to...

  • Explore the nature of prevalent, and potentially catastrophic, cybersecurity attacks
  • Investigate real-world examples of various types of attacks and their outcomes
  • Explain methods to discern the various types of attacks and techniques to protect against them

Who is the course for?

This cyber security training is aimed at IT professionals who want to understand how to protect their organization from cyberattacks. This might include data administrators, those working with sensitive data, or those targeting a career in cyber security.

Who developed the course?

EC-Council

International Council of E-Commerce Consultants, also known as EC-Council, is the world’s largest cyber security technical certification body.

About this ExpertTrack

Discover why cyber security is important, and how to build organizational cyber resilience in these four cyber security courses.

Start learning today - free 7-day trial

After your free trial you can:

  • Pay $39 per month to keep learning online
  • Have complete control over your subscription; you can cancel any time
  • Work at your own pace and set your own deadlines at every stage
  • Only pay while you’re learning; the subscription will cancel automatically when you finish
  • Complete online assessments to test your knowledge and prove your skills
  • Earn digital course certificates and a final award that you can share online, with potential employers, and your professional network
  • Keep access to the content of courses you complete even after your subscription ends