Field of Study: Information Technology
Publication date: March 2022
The malware and cybersecurity landscapes are constantly shifting in response to the actions of one another. On one side, cybersecurity experts are identifying, analyzing, and patching new forms of malware as consistently as possible, so they can be detected by antivirus software and purged from infected systems before they can cause harm to their potential victims. On the other side, malware creators and cybercriminal organizations are constantly creating new malware, and altering old malware, to circumvent cybersecurity efforts, and continuing to infect as many computers as possible.
This course identifies the overarching concepts that make up the current information security landscape. It provides an overview of the different types of malware that can infect a computer system, as well as the different techniques used to conduct both phishing attacks and identity theft. It also identifies the general malware trends over the past several years, and explains how the current malware landscape arrived at where it is today.
Finally, this course describes the most commonly seen pieces of malware from this year, and provides an in-depth explanation on how the malware operates, and the best practices to properly deal with each piece of malware.
This is a self-study CPE course.
Program level: Intermediate
Prerequisites: None
Advanced Preparation: None Required
Minimum Final Examination Passing Grade: 70%
Maximum Time Allowed To Complete Program: One Year From Date Of Purchase