2.5 Lab Wrap-Up

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
49 minutes
Difficulty
Intermediate
CEU/CPE
1
Video Transcription
00:00
Hey, everyone, Can Underhill here? Master instructor of Rhys Ibori. I hope you're enjoying the course so far and also hope that you've enjoyed the couple of examples that Dave showed you on our attacks.
00:09
Now, as he mentioned, is gonna be showing you in some future courses on how to design your own Mauer again just for ethical purposes.
00:16
So we're to take a look in the next video on a next lab, and we're to continue on with our course on Mauer threats.
Up Next
Malware Threats

This malware analysis training course covers basic information about things like viruses, worms, Trojans, ransomware, and more.

Instructed By