17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
If You Need More Stuff, kindly Visit and Support Us -->> https://CourseWikia.com
Instructors: Dale Meredith
Duration: 5h 12m • 11 sections
Video: MP4 1280x720 44 KHz | English
Level: Intermediate | Size: 575 MB
Malware is specifically designed to gain access or damage systems without the knowledge of the victim. This course will teach you how malware is created, utilized, and detected. You’ll learn all that is needed for the CEH 312-50 concerning malware.
What you'll learn
The easiest way to get into a system or network is…to get someone to let us in. Malware is on the rise due to the sheer volume of new devices and users being added daily to network infrastructures. In this course, Ethical Hacking: Malware Threats, you’ll learn how malware is created, utilized, and detected on networks. First, you’ll explore the different concepts and types of trojans, viruses, and worms. Next, you’ll discover malware concepts and components. Finally, you’ll learn the different countermeasures every organization should be following. When you’re finished with this course, you’ll have the skills and knowledge of malware threats needed for the CEH 312-50 exam.
If You Need More Stuff, kindly Visit and Support Us -->> https://FreeCourseWeb.com
Get More Tutorials and Support Us -->> https://DevCourseWeb.com
We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/01. Course Overview/01. Course Overview.mp4
5.1 MB
~Get Your Files Here !/02. Explaining Malware Threats/02. The Hard Truth Behind Malware.mp4
6.6 MB
~Get Your Files Here !/02. Explaining Malware Threats/03. What Is Malware.mp4
9.3 MB
~Get Your Files Here !/02. Explaining Malware Threats/04. Malware Components.mp4
5.4 MB
~Get Your Files Here !/02. Explaining Malware Threats/05. How Malware Gets in a System.mp4
10.5 MB
~Get Your Files Here !/02. Explaining Malware Threats/06. Deployment Techniques.mp4
16.3 MB
~Get Your Files Here !/02. Explaining Malware Threats/07. Demo-Task Manager.mp4
22.7 MB
~Get Your Files Here !/02. Explaining Malware Threats/08. The Numbers Behind Malware.mp4
12.8 MB
~Get Your Files Here !/02. Explaining Malware Threats/09. Learning Check.mp4
3.4 MB
~Get Your Files Here !/03. Discussing Advanced Persistent Threats APT/10. Whats an APT.mp4
14.2 MB
~Get Your Files Here !/03. Discussing Advanced Persistent Threats APT/11. APT Characteristics.mp4
6.8 MB
~Get Your Files Here !/03. Discussing Advanced Persistent Threats APT/12. Lifecycle of an APT.mp4
7.4 MB
~Get Your Files Here !/03. Discussing Advanced Persistent Threats APT/13. Learning Check.mp4
2.2 MB
~Get Your Files Here !/04. Explaining Trojans/14. Explaining Trojans.mp4
11.6 MB
~Get Your Files Here !/04. Explaining Trojans/15. Whats the Goal.mp4
9.2 MB
~Get Your Files Here !/04. Explaining Trojans/16. How Trojans Communicate and Hide.mp4
6.4 MB
~Get Your Files Here !/04. Explaining Trojans/17. Demo-What Ports Are Listening.mp4
8.8 MB
~Get Your Files Here !/04. Explaining Trojans/18. Indicators You Have a Trojan.mp4
11.8 MB
~Get Your Files Here !/04. Explaining Trojans/19. Learning Check.mp4
1.2 MB
~Get Your Files Here !/05. Diving Deeper into Trojans/20. How to Infect the Target.mp4
10.5 MB
~Get Your Files Here !/05. Diving Deeper into Trojans/21. Demo-Using SET to Create a Trojan.mp4
16.7 MB
~Get Your Files Here !/05. Diving Deeper into Trojans/22. Transmitting a Trojan Package.mp4
6.7 MB
~Get Your Files Here !/05. Diving Deeper into Trojans/23. Evading Anti-virus.mp4
2.3 MB
~Get Your Files Here !/05. Diving Deeper into Trojans/24. Demo-Create a Trojan with MSFVENOM.mp4
5.8 MB
~Get Your Files Here !/05. Diving Deeper into Trojans/25. Learning Check.mp4
2.2 MB
~Get Your Files Here !/06. Describing the Types of Trojans/26. Types of Trojans.mp4
13 MB
~Get Your Files Here !/06. Describing the Types of Trojans/27. Continuing Dales Top 10.mp4
13.7 MB
~Get Your Files Here !/06. Describing the Types of Trojans/28. More Trojans.mp4
16.5 MB
~Get Your Files Here !/06. Describing the Types of Trojans/29. Mobile and IoT Trojans.mp4
9.7 MB
~Get Your Files Here !/06. Describing the Types of Trojans/30. Demo-Creating a Trojan with TheFatRAT.mp4
11.1 MB
~Get Your Files Here !/06. Describing the Types of Trojans/31. Learning Checks.mp4
1.8 MB
~Get Your Files Here !/07. Explaining Worms and Viruses/32. Explaining Worms and Virus.mp4
18.3 MB
~Get Your Files Here !/07. Explaining Worms and Viruses/33. Types of Viruses and Worms.mp4
15.8 MB
~Get Your Files Here !/07. Explaining Worms and Viruses/34. Demo-File Extension Hack .mp4
19.2 MB
~Get Your Files Here !/07. Explaining Worms and Viruses/35. Lifecycle.mp4
7.6 MB
~Get Your Files Here !/07. Explaining Worms and Viruses/36. The Signs and Why.mp4
8.3 MB
~Get Your Files Here !/07. Explaining Worms and Viruses/37. Deployment.mp4
4.9 MB
~Get Your Files Here !/07. Explaining Worms and Viruses/38. Real Fake Does It Matter.mp4
4.9 MB
~Get Your Files Here !/07. Explaining Worms and Viruses/39. Learning Checks.mp4
3.6 MB
~Get Your Files Here !/08. Reviewing Fileless Malware/40. What Is Fileless Malware.mp4
5.7 MB
~Get Your Files Here !/08. Reviewing Fileless Malware/41. Fileless Techniques.mp4
3.2 MB
~Get Your Files Here !/08. Reviewing Fileless Malware/42. Taxonomy.mp4
5.8 MB
~Get Your Files Here !/08. Reviewing Fileless Malware/43. How Does Fileless Malware Work.mp4
6.5 MB
~Get Your Files Here !/08. Reviewing Fileless Malware/44. Launching Fileless Malware.mp4
9.5 MB
~Get Your Files Here !/08. Reviewing Fileless Malware/45. Learning Checks.mp4
1.9 MB
~Get Your Files Here !/09. Detecting Malware/46. Detecting Malware.mp4
14 MB
~Get Your Files Here !/09. Detecting Malware/47. Types of Malware Analysis.mp4
11.8 MB
~Get Your Files Here !/09. Detecting Malware/48. Investigation Continues.mp4
5.1 MB
~Get Your Files Here !/09. Detecting Malware/49. Demo-Autoruns and VirusTotal.mp4
19.1 MB
~Get Your Files Here !/09. Detecting Malware/50. Investigation Still Continues.mp4
4.7 MB
~Get Your Files Here !/09. Detecting Malware/51. Tools.mp4
1.4 MB
~Get Your Files Here !/09. Detecting Malware/52. Demo-TCPView and DriverView.mp4
34.2 MB
~Get Your Files Here !/09. Detecting Malware/53. The Creation Process.mp4
2.6 MB
~Get Your Files Here !/09. Detecting Malware/54. Demo-JPS Virus Maker and IWMT.mp4
9.8 MB
~Get Your Files Here !/09. Detecting Malware/55. Learning Checks.mp4
2 MB
~Get Your Files Here !/10. Deploying Countermeasure for Malware/56. Countermeasures.mp4
11.9 MB
~Get Your Files Here !/10. Deploying Countermeasure for Malware/57. Master List.mp4
10 MB
~Get Your Files Here !/10. Deploying Countermeasure for Malware/58. Learning Checks.mp4
9.7 MB
~Get Your Files Here !/11. Domain Summary/59. Domain Summary.mp4
3.9 MB
~Get Your Files Here !/Bonus Resources.txt
386 B
~Get Your Files Here !/Exercise Files/01/demos.docx
73.9 KB
~Get Your Files Here !/Exercise Files/02/explaining-malware-threats-slides.pdf
5 MB
~Get Your Files Here !/Exercise Files/03/discussing-advanced-persistent-threats-apt-slides.pdf
1.7 MB
~Get Your Files Here !/Exercise Files/04/explaining-trojans-slides.pdf
3 MB
~Get Your Files Here !/Exercise Files/05/diving-deeper-into-trojans-slides.pdf
533.7 KB
~Get Your Files Here !/Exercise Files/06/describing-the-types-of-trojans-slides.pdf
6.7 MB
~Get Your Files Here !/Exercise Files/07/explaining-worms-and-viruses-slides.pdf
8.5 MB
~Get Your Files Here !/Exercise Files/08/reviewing-fileless-malware-slides.pdf
1.6 MB
~Get Your Files Here !/Exercise Files/09/detecting-malware-slides.pdf
7.8 MB
~Get Your Files Here !/Exercise Files/10/deploying-countermeasure-for-malware-slides.pdf
1.4 MB
~Get Your Files Here !/Exercise Files/11/domain-summary-slides.pdf
124.5 KB
~Get Your Files Here !/Exercise Files/Study Guide.docx