Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Virus,Worm,Trojan,Backdoor & Antivirus-Malware and Security
Malware - Wide threat faced by the common man
001 Objective and Outcome (0:39)
002 Introduction to Malware (2:04)
Viruses
003 Virus an introduction (1:33)
004 Life cycle of a Virus - Phase 1 (2:02)
005 Making the Virus appear benign (1:11)
006 Transmission and Triggering Phase 23 (2:35)
007 Infection - Phase 4 and The code (2:01)
Worms
008 Worm An Introduction (1:03)
009 Life cycle of a Worm - Phase 1 (1:47)
010 Propagation Vs Transmission (0:36)
011 Propagation Triggering and Infection Phase 23 and 4 (1:11)
012 The code (2:44)
013 Types of Worm - Identification - Phase 5 (1:32)
Trojans
014 Trojan An Introduction (1:55)
015 Life cycle of a Trojan - Phase 1 (1:58)
016 Creation using tool Phase 1 (0:54)
017 Transmission and Triggering - Phase 2 and 3 (0:28)
018 Infection - Phase 4 (0:48)
019 The code (0:53)
020 Types of Trojan (1:52)
021 Identification Phase 5 (0:23)
022 Removal Phase 6 (1:59)
Backdoors
023 Backdoor An Introduction (0:55)
024 Conventional Backdoor (1:57)
025 Unconventional Backdoor (1:39)
026 Phases of a conventional backdoor (2:41)
027 Phases of an unconventional Backdoor (2:25)
028 Backdoor on an XP machine (2:00)
029 Removal of a backdoor (1:08)
Anti Virus
030 Antivirus (1:05)
031 Components of AV (2:02)
032 2 stage AV working (1:54)
033 Virus Lab (2:10)
034 Checking the AV functionality (0:59)
035 Dodging the AV (2:14)
036 File Encoding (1:13)
037 Current Working arenas in Antivirus (1:54)
031 Components of AV
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock