Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

FutureLearn

Cyber Security Foundations: Common Malware Attacks and Defense Strategies

EC-Council via FutureLearn

Overview

According to Accenture, malware attacks are the most common type of cyber attack experienced by organizations around the world. These attacks are also the most expensive. Accenture estimates that they cost businesses an average of $2.6 million apiece each year.

The cyber security risks from malware are not limited to ransomware, however. Malware describes any sort of software that is designed to gain unauthorized access to a computer system such as trojan horses and spyware.

Learn how to prevent malware attacks

This cyber security course will guide you to improve your organization’s cyber resilience against malware attacks. You will study examples of malware attacks to understand common threats, and ultimately learn how to prevent malware attacks.

Understand cyber security risks and build cyber resilience

The threat from malware is constantly evolving. New threats continue to enter the market as existing actors’ operations grow more sophisticated. Part of the danger comes from changing business practices. 80% of businesses surveyed by Accenture were adopting new technologies faster than they were able to account for resulting cyber security risks.

The only way to successfully face down this challenge is through building organizational cyber resilience. The first step of malware protection is to know your enemy. This course will explore how to prevent malware attacks by helping you to recognize them.

You’ll learn about common types of malware attacks and different malware strategies, illustrated with case studies of malware attacks in action. You’ll further become familiar with modern malware families, gaining a structural understanding to help you keep pace with evolving threats.

This cyber security training is aimed at IT professionals who want to understand how to protect their organization from cyberattacks. This might include data administrators, those working with sensitive data, or those targeting a career in cyber security.

Syllabus

  • Phishing Related Cybersecurity Attacks
    • Welcome to the Course
    • Phishing
    • Spear-phishing
    • Whaling
    • Smishing
    • Vishing
    • Summary
  • Social Engineering Techniques
    • Welcome to Week 2
    • Dumpster Diving
    • Tailgating
    • Baiting
    • Impersonation
    • Summary
  • An Introduction to the World of Malware
    • Welcome to Week 3
    • Malware in the Real World and the Media
    • What Is a Virus?
    • What Are Worms?
    • What Are Trojans?
    • What Is Ransomware?
    • Summary
  • Malware Today
    • Welcome to Week 4
    • Adware: Unclosable Ad Traps
    • Spyware: Invades Devices and Steals Sensitive Information
    • File-less Malware: Sneaks into Your Running Application
    • The Hybrid Attack: A Combination of Different Malware
    • Summary

Taught by

EC-Council Educator Team

Reviews

3 rating at FutureLearn based on 1 rating

Start your review of Cyber Security Foundations: Common Malware Attacks and Defense Strategies

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.