Malware Threats

Interested in penetration testing and malware analysis? This malware course introduces you to different types of malware, like viruses, worms, and Trojans. Gain hands-on experience in analyzing malicious files, identifying malicious processes, and more.

Course Content

Course Description

This basic malware course is a good starting point for students interested in both penetration testing and malware analysis. Students studying for industry certification exams, like CEH, may find the course beneficial.

## Prerequisites

Students should be familiar with common IT and cybersecurity terminology.

## Study Resources

The course will include a study guide and glossary. Students will also get step by step guides for all labs.

## Course Goals

By the end of this course, students should be able to:

  • Explain the common types of malware
  • Analyze a malicious file
  • This skill-based malware analysis course is intended to introduce students to malware, terminology, and focuses on a hands-on approach with labs. Several labs will help reinforce the learning. This course is instructed at a beginner level. Ideally, students will either be pursuing certifications, like the EC-Council Certified Ethical Hacker (CEH), CompTIA Pentest+, or OSCP, since the knowledge gained in this course will help students prepare for these examinations.

    Want to go into more depth? Take our [malware analysis course]( too!

    This course is part of a Career Path:
    Become a SOC Analyst - Level 1
    A Security Operations Center Analyst (SOC Analyst) stands as a front line of defense against the ever present cyber threats faced by organizations today. A SOC team ensures an organization’s digital assets remain secure and protected from unauthorized access by monitoring and responding to massive amounts of data in record time. In this role, you will protect your organization’s infrastructure by monitoring data to identify suspicious activity, then mitigating risks before a breach occurs. Cybrary's Become a SOC Analyst - Level 1 career path will equip you to break into the field with skills aligned to the US National Institute of Standards and Technology's Cyber Defense Analyst NICE work role.

    Instructed by

    Senior Instructor
    Ken Underhill

    I am the Master Instructor at Cybrary and a Cybersecurity professional. I have worked primarily in healthcare and as an adjunct professor of digital forensics. I have been instructing online for several years, primarily in business and health-related areas. I hold both the CEH (Certified Ethical Hacker)and CHFI (Computer Hacking Forensic Investigator) certifications from EC-Council and am a content reviewer/writer for both exams (no, I can’t give you the answer key lol). I began helping other professionals pass the CHFI exam after struggling in my first exam attempt. To date, I have helped tens of thousands of people around the world pass the CEH and CHFI exams.

    Cybrary Logo
    Certification Body
    Certificate of Completion

    Complete this entire course to earn a Malware Threats Certificate of Completion