Learn your way! Get started

Certified Ethical Hacker, Part 4 of 8: Malware and Social Engineering

with expert Rafiq Wayani


Watch trailer


Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack

Release date 12/16/2015
Level Intermediate
Runtime 2h 11m
Closed captioning N/A
Transcript N/A
eBooks / courseware N/A
Hands-on labs N/A
Sample code N/A
Exams Included


Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

There are many different types of Malware from trojans and worms to viruses and backdoors. Learning about how each threat is different is key and about how to mitigate it. Examples will be shown with Wireshark and how to interact with Packets. Also the human element of Ethical Hacking will be covered. Perhaps a company is very good in network security but lacking in physical security. This is an area that social engineering can come into play. How do you case an establishment and look for week points in the human element? And also how can you attempt to mitigate these threats. This course is part of a series covering EC-Council's Certified Ethical Hacker (CEH).

Prerequisites

To get the most out of this course, this course assumes that you have a good working knowledge of Linux and Windows based networking environments. It also assumes that you have experience with managing a network, have worked with networking hardware such as switches & routers, are familiar with MS Active Directory (AD) Domain based authentication, know how to work with command-line utilities, and understand the basics of Web Server environments. Many of the demonstrations in this course use the Windows 7 and Kali Linux operating systems which can be downloaded free from the respective sites. All of the demonstrations are created in a virtual environment using Oracle VirtualBox and VMware vSphere 6.

Learning Paths

This course will help you prepare for the following certification and exam:
Certified Ethical Hacker
312-50: Certified Ethical Hacker

Meet the expert

Rafiq Wayani has extensive experience including more than 20 years in IT as Systems Architect, Software Engineer, DBA, and Project Manager. Wayani has instructed in a variety of technical areas, has designed and implemented network and information systems, and is certified across a wide range of platforms and systems including Microsoft Solutions Developer, Systems Engineer, Application Developer, Database Administrator, Trainer; Novell Netware Administrator and Engineer; Master Certified Netware Engineer; and A Certified.

Course outline



Trojans and Viruses

Trojans and Backdoors (12:32)
  • Introduction (00:19)
  • Trojans & Backdoors (05:46)
  • Trojan (03:02)
  • Virus & Worm (03:06)
  • Summary (00:17)
Trojans and Backdoors Demo (06:44)
  • Introduction (00:17)
  • Demo: Creating a Backdoor (02:41)
  • Demo: Using a Backdoor (03:29)
  • Summary (00:16)
Viruses (14:56)
  • Introduction (00:18)
  • Viruses (04:52)
  • Virus Types (03:38)
  • Things to Remember (05:47)
  • Summary (00:20)
Viruses Demo (11:05)
  • Introduction (00:19)
  • Demo: TeraBIT Virus Maker (05:43)
  • Demo: Virus (04:47)
  • Summary (00:14)

Worms and Sniffing

Worms (07:27)
  • Introduction (00:13)
  • Worms (01:29)
  • Not Like a Virus (02:00)
  • Mitigating Worms (03:29)
  • Summary (00:13)
Worms Demo (12:42)
  • Introduction (00:18)
  • Demo: Internt Worm Maker Thing (04:29)
  • Demo: Worm Settings (03:28)
  • Demo: Inside the Worm (04:10)
  • Summary (00:15)
Sniffing (20:41)
  • Introduction (00:21)
  • Sniffing (03:50)
  • Protecting Your Network (01:48)
  • Demo: Sniffing (04:02)
  • Demo: Wireshark (03:46)
  • Demo: Spoofing (03:37)
  • Demo: Manipulate Source (02:50)
  • Summary (00:22)

Social Engineering and Countermeasures

Social Engineering (13:57)
  • Introduction (00:19)
  • Social Engineering (06:15)
  • Means of Social Engineering (05:06)
  • Social Engineering Requirement (02:03)
  • Summary (00:11)
Social Engineering Techniques (10:46)
  • Introduction (00:19)
  • Social Engineering Techniques (02:56)
  • More Techniques (04:11)
  • Even More Techniques (02:55)
  • Summary (00:23)
Tech Attacks Countermeasures (11:02)
  • Introduction (00:25)
  • Soc. Engineering: Tech Attacks (05:40)
  • Countermeasures (04:41)
  • Summary (00:14)
DOS Attacks (09:24)
  • Introduction (00:21)
  • Denial of Service (DOS) Attack (03:01)
  • DOS Attack Targets (01:16)
  • Demo: DOS Attack (04:27)
  • Summary (00:17)