Author : | Andrew Clark, EA |
Course Length : | Pages: 59 ||| Word Count: 47,554 ||| Review Questions: 18 ||| Final Exam Questions: 30 |
CPE Credits : | 6.0 |
IRS Credits : | 0 |
Price : | $53.95 |
Passing Score : | 70% |
Course Type: | NASBA QAS - Text - NASBA Registry |
Technical Designation: | NonTechnical |
Primary Subject-Field Of Study: | Computer Software & Applications - Computer Software & Applications for Course Id 1542 |
Description : | The malware and cybersecurity landscapes are constantly shifting in response to the actions of one another. On one side, cybersecurity experts are identifying, analyzing, and patching new forms of malware as consistently as possible so they can be detected by antivirus software and purged from infected systems before they can cause harm to their potential victims. On the other side, malware creators and cybercriminal organizations are constantly creating new malware, and altering old malware, to circumvent cybersecurity efforts and continue to infect as many computers as possible for a variety of purposes. This course will identify the overarching concepts that make up the current information security landscape. This course will provide an overview of the different types of malware that can infect a computer system as well as the different techniques used to conduct both phishing attacks and identity theft. This course will identify the general malware trends over the past several years and explain how the current malware landscape arrived at where it is today. Finally, this course will describe the most commonly seen pieces of malware from this year and provide both an in-depth explanation on how the malware operates and best practices to properly deal with each piece of malware. |
Usage Rank : | 17500 |
Release : | 2024 |
Version : | 1.0 |
Prerequisites : | None. |
Experience Level : | Overview |
Additional Contents : | Complete, no additional material needed. |
Additional Links : |
Cybersecurity: Meaning, Types of Cyber Attacks, Common Targets
|
Advance Preparation : | None. |
Delivery Method : | QAS Self Study |
Intended Participants : | Anyone needing Continuing Professional Education (CPE). |
Revision Date : | 03-Jul-2024 |
NASBA Course Declaration : | Participants must complete the final examination within one year of purchase and with a minimum passing grade of 70% or better to receive CPE credit unless otherwise noted on the Course History page (i.e. California Ethics must score 90% or better). After logging in click on the Course History links on your My Courses page for the Begin date and Expire date for the Final Exam. |
Approved Audience : | NASBA QAS - Text - NASBA Registry - 1542 |
Keywords : | Computer Software & Applications, Information Security, Protecting, Company, Data, Malware, Trends, Mitigation, Strategies, cpe, cpa, online course |
Learning Objectives : |
Course Learning Objectives At the end of this course, students will be able to:
|
Course Contents : | Chapter 1 - Information Security - Protecting Company Data: Malware Trends and Mitigation Strategies Course Learning Objectives Introduction Information Security Internet Information Security Tools and Processes Application security Cloud security Cryptography Infrastructure security Incident response Vulnerability management Security Concepts Confidentiality Integrity Availability People Accessing Information Authentication Authorization Nonrepudiation Malware Definition Viruses and Worms Virus Worm Trojans Backdoor / Remote Access Trojan (RAT) Botnets Adware Information stealers Ransomware Rootkits Downloaders or droppers File Wipers Spyware Malware Summary Phishing Spear Phishing Clone Phishing Whale Phishing Social Media Phishing Phishing Evolution Phishing Opportunities Criminals are Learning and Evolving Phishing Tools Bots/Botnets Phishing Kits URL Obfuscation Simple HTML redirection Use of JPEG images Use of alternate IP addresses Registration of similar domain names Web Browser Vulnerabilities used for Phishing Session Hijacking Domain Name Resolving Attacks Global DNS Hijacking Campaign Cross-Site Scripting Attacks Domain Name Typos Man-in-the-Middle Attacks Phishing Bancos Bankash W32/Grams CoreFloo Dyre Banking Malware Phishing Mitigations Phishing Solutions Prevent Phishing Attacks Identity Theft Identity Theft Methods Trash Sifting/Dumpster Diving Mail Theft Address Manipulation: Skimming Scanning Straightforward Theft: Conning Identity Theft Crimes Yahoo Data Breach Equifax breach Target Data Breach Review Questions Malware Trends 2014 Malware Trends Increases in Researcher Evasion Malware Source Code Leaks Changes in Account Takeover Fraud Execution Mobile SMS Malware Rose in Popularity Obsolete Malware Infection Techniques Started Making a Comeback 2015 Malware Trends Mobile Banking Trojans on the Rise Overlay of Malware on Top of Legitimate Applications Increases in Mobile Ransomware First Ransomware for Linux Detected Encryption-Based Ransomware is on the Rise 2016 Malware Trends Ransomware Solidified Itself as a Serious Threat Underground Cybercriminal Marketplaces are Becoming More Common $100 Million was Stolen from Banks in SWIFT-Enabled Transfers BlackEnergy Wreaked Havok on Vulnerable Critical Ukrainian Infrastructure Mirai Botnet Attack Shows the Vulnerability of Internet of Things (IoT) Devices Mobile Adware Infections Increase Dramatically 2017 Malware Trends Despite the Plateauing of new Ransomware Families, WannaCry and NotPetya take the Ransomware Landscape by storm Mobile “Evasive” Malware is Extremely Popular and More Dangerous Than It’s Ever Been Losses from Business Email Compromise and CEO Fraud Reach $5 Billion 2018 Malware Trends Botnets Are Now Used to Attack Both Organizations and Users of Infected Computers As Rooted Mobile Malware Declines in Popularity, Traditional Malware Infection Rates Surge With the Rising Value of Cryptocurrency, Mining Malware is Rising in Popularity 2019 Malware Trends WannaCry Ransomware Kovter Click Fraud Malware Gh0st RAT NanoCore RAT CoinMiner Cryptocurrency Mining Malware ZeuS Modular Banking Malware Emotet Infostealer Trickbot Banking Trojan Qakbot Financial Malware Dridex Banking Trojan Common Malware Threats of 2020 KMS Dridex Banking Trojan Tech Support Scams Glupteba Trojan Infostealers Important Mentions: Trickbot and Emotet Infostealer Important Malware Trends of 2021 Ransomware Attacks Will Continue to Increase in Both Number and Sophistication in 2021 Cybercriminals and Threat Actors will Continue to Exploit the COVID-19 Pandemic Non-Windows Malware Attacks are Increasing Vulnerabilities that Enable Malware will Likely Increase in 2021 Important Malware Trends of 2022 Healthcare Sector Cyberattacks are on the Rise Ransomware Attacks are Becoming more Sophisticated and Vicious Security-as-a-Service and Zero Trust Networks is on the Rise Important Malware Trends of 2023 Ransomware Attacks Continue to Grow, but Switch Focus to Supply Chain Companies Ransomware-as-a-Service Increases in Popularity Zero Trust Security Systems See Wider Implementation, but still aren’t Perfect Important Malware Trends of 2024 AI is at the forefront of the Cybersecurity Landscape in 2024 The Evolution of Malware using AI – Polymorphic and Metamorphic Malware The Rise of Loaders, Stealers, and RATs IoT Devices Continue to be a Priority Target for Cybercriminals Review Questions Glossary |