Limited-Time Offer: Up to 75% Off Coursera Plus!
7000+ certificate courses from Google, Microsoft, IBM, and many more.
The course aims to educate participants on the advanced techniques used by threat actors to evade security measures and remain undetected on victim machines. Participants will learn about the utilization of older, lesser-known Windows APIs via Component Object Model (COM) for staging and concealment by malware. The course will cover how threat actors leverage COM to create folders that the Operating System cannot render or access, thus evading security scans. Additionally, participants will understand how this wormable malware spreads across networks via USB air-gap jumping. The teaching method involves a presentation describing the use of COM to instantiate Windows APIs and exploit Windows Explorer. This course is intended for cybersecurity professionals, researchers, and individuals interested in understanding and combating advanced cyber threats.