Certified Ethical Hacker, Part 4 of 8: Malware and Social Engineering
with expert Rafiq Wayani
There are many different types of Malware from trojans and worms to viruses and backdoors. Learning about how each threat is different is key and about how to mitigate it. Examples will be shown with Wireshark and how to interact with Packets. Also the human element of Ethical Hacking will be covered. Perhaps a company is very good in network security but lacking in physical security. This is an area that social engineering can come into play. How do you case an establishment and look for week points in the human element? And also how can you attempt to mitigate these threats. This course is part of a series covering EC-Council's Certified Ethical Hacker (CEH).
Intermediate | 2h 11m | December 16, 2015
Course OutlineRafiq Wayani
Rafiq Wayani has extensive experience including more than 20 years in IT as Systems Architect, Software Engineer, DBA, and Project Manager. Wayani has instructed in a variety of technical areas, has designed and implemented network and information systems, and is certified across a wide range of platforms and systems including Microsoft Solutions Developer, Systems Engineer, Application Developer, Database Administrator, Trainer; Novell Netware Administrator and Engineer; Master Certified Netware Engineer; and A Certified.