What will you learn in this course?
Learn how malware works and all the routes that malware takes to do damage to your system.
The malware executes in a command shell, it begins by checking to see if the executing file contains the MZP file extension, and then continues to access the Windows Registry checking to see if a few local registry values exists. The malware will then try to search and display information regarding the executing host (such as a server) including but not limited to the password, port number, ICQ number, and E-mail address.
In this section, you will understand how malware makes use of various API functions to implement certain functionality.
Basic knowledge of computer security.
Learn how malware works and all the routes that malware takes to do damage to your system.
About 4 hours of interactive and theoretical content.