0% found this document useful (0 votes)
105 views1 page

Clearing Logs: Module 07: Malware Threats

Uploaded by

coder
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
105 views1 page

Clearing Logs: Module 07: Malware Threats

Uploaded by

coder
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker

Course Outline

Clearing Logs
 Covering Tracks
 Disabling Auditing: Auditpol
 Clearing Logs
 Manually Clearing Event Logs
 Ways to Clear Online Tracks
 Covering BASH Shell Tracks
 Covering Tracks on a Network
 Covering Tracks on an OS
 Delete Files using Cipher.exe
 Disable Windows Functionality
 Track-Covering Tools
 Defending against Covering Tracks

Module 07: Malware Threats


Malware Concepts
 Introduction to Malware
 Different Ways for Malware to Enter a System
 Common Techniques Attackers Use to Distribute Malware on the Web
 Components of Malware
APT Concepts
 What are Advanced Persistent Threats?
 Characteristics of Advanced Persistent Threats
 Advanced Persistent Threat Lifecycle
Trojan Concepts
 What is a Trojan?
 How Hackers Use Trojans
 Common Ports used by Trojans
 Types of Trojans
o Remote Access Trojans
o Backdoor Trojans

Page | 13 Ethical Hacking and Countermeasures Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.

You might also like