From the course: Cybersecurity Foundations: Computer Forensics
Unlock the full course today
Join today to access over 25,200 courses taught by industry experts.
Malware forensics
From the course: Cybersecurity Foundations: Computer Forensics
Malware forensics
- [Instructor] Malware is short for malicious software. Cyber criminals frequently use malware to commit crimes. Computer viruses used to be the majority of malware we encountered, which is no longer the case. Malware has evolved since its first appearance. Many types of malware now exist including viruses, worms, adware, Trojan horses, rootkit, and ransomware. Viruses need human assistance like opening a file while worms can spread on their own through network connections. Adware is less damaging than other malware that destroys information because its goal is to display advertisements. It's annoying but better than losing access to data. Trojan horses appear benign and valuable on the surface, but the software performs steps to inflict damage behind the scenes. Rootkits change your operating system altogether to hide any suspicious activities. Changes are only visible to the installers of the rootkit. Victims cannot detect…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
(Locked)
Specializations in computer forensics4m 18s
-
(Locked)
Network forensics3m 11s
-
(Locked)
Operating system forensics3m 49s
-
(Locked)
Web forensics3m 37s
-
(Locked)
Cloud forensics3m 22s
-
(Locked)
Malware forensics3m 40s
-
(Locked)
Mobile forensics3m 17s
-
(Locked)
Email forensics3m 56s
-
(Locked)
Certifications1m 58s
-
(Locked)
-
-
-
-
-
-