In this video, you will be introduced to impersonation, explore the main objectives of this type of social engineering attack, and identify who is at risk.
In the video, you will learn about the capabilities of File-less Malware, which leverages binaries already on a system. It is very effective because it has no signature, the binaries …
In the video, you will be introduced to FinFisher, a major spyware, that can hijack webcam and microphones. The information gained by spyware such as FinFisher is sold, typically to …
In the video, you will learn how spyware invades devices and gathers information about users (e.g. sites visited, passwords, payment info, emails), and sends the information back to the controller, …
In this video, you will learn more about Adware. Adware is unwanted software designed to throw advertisements on your screen. Although, in most cases, it is more annoying than harmful, …
In this video, you will be introduced to tailgating. You will explore the main objectives of this type of social engineering attack and identify who is at risk.
In this video you will learn more about dumpster diving, to complement your learning from the previous course. We will explore the main objectives of this type of social engineering …
In the video, we will take an overview of NotPetya, considered the most devastating ransomware attack in recent years. The malware is named after a previous form of ransomware, Petya, …
In this video, you will learn more about Ransomware, a type of malware that locks files and then prompts users to pay in order to unlock them. Increasingly, this is …
This video will reveal more about Ransomware, a type of malware that locks files, and then prompts users to pay in order to unlock them. Increasingly, this is the most …
In the video, you will learn about Trojans, which take their name from the ancient Greek legend of the Odyssey. During the 10-year long Trojan War, the Greeks offered the …