• EC-council logo

Cyber Security Foundations: Common Malware Attacks and Defense Strategies

Discover how to defend yourself against evolving cyber attacks in this cyber security training focused on malware protection.

  • Duration

    4 weeks
  • Weekly study

    2 hours

According to Accenture, malware attacks are the most common type of cyber attack experienced by organizations around the world. These attacks are also the most expensive. Accenture estimates that they cost businesses an average of $2.6 million apiece each year.

The cyber security risks from malware are not limited to ransomware, however. Malware describes any sort of software that is designed to gain unauthorized access to a computer system such as trojan horses and spyware.

Learn how to prevent malware attacks

This cyber security course will guide you to improve your organization’s cyber resilience against malware attacks. You will study examples of malware attacks to understand common threats, and ultimately learn how to prevent malware attacks.

Understand cyber security risks and build cyber resilience

The threat from malware is constantly evolving. New threats continue to enter the market as existing actors’ operations grow more sophisticated. Part of the danger comes from changing business practices. 80% of businesses surveyed by Accenture were adopting new technologies faster than they were able to account for resulting cyber security risks.

The only way to successfully face down this challenge is through building organizational cyber resilience. The first step of malware protection is to know your enemy. This course will explore how to prevent malware attacks by helping you to recognize them.

You’ll learn about common types of malware attacks and different malware strategies, illustrated with case studies of malware attacks in action. You’ll further become familiar with modern malware families, gaining a structural understanding to help you keep pace with evolving threats.

Syllabus

  • Week 1

    Phishing Related Cybersecurity Attacks

    • Photographic image of laptop with a red glow overlay

      Welcome to the Course

      In this activity, you will be introduced to your educator and will learn what to expect in the coming two weeks.

    • Photographic image of laptop mouse being pulled by a fishing hook

      Phishing

      In this activity, you will learn what phishing is and explore examples to help you identify these attacks and defend against them.

    • Photographic image of laptop with cable twisted in the shape of an email icon

      Spear-phishing

      In this activity, you will learn about Spear-phishing to ensure that you are able to identify an attack and protect yourself against this specialized form of phishing.

    • Photographic image of professionally dressed people standing in a room

      Whaling

      In this activity, you will learn about whaling, its importance, and best practices to ensure that you are defended against it.

    • Photographic image of a mobile phone being used by a man to take a photo of a credit card

      Smishing

      In this activity, you will learn about smishing, explore examples, and cover best practices to defend against this attack.

    • Photographic image of a woman sitting at an office desk talking on the phone while reading from a piece of paper

      Vishing

      In this activity, you will learn about vishing, explore examples, and cover best practices to defend against this attack.

    • A red envelope hovering over a digital matrix of blocks

      Summary

      You have reached the end of Week 1. Let’s reflect on what you have learned so far.

  • Week 2

    Social Engineering Techniques

    • Photographic image of two men shaking hands while one crosses his fingers behind his back

      Welcome to Week 2

      Introduction to the content that will be covered this week.

    • Photographic image of a stack of files with shredded paper next to it

      Dumpster Diving

      In this activity, you will learn about dumpster diving to ensure that you know how to identify risks and prevent such an attack.

    • A revolving office door.

      Tailgating

      In this activity, you will learn about tailgating to ensure that you are aware of the tactics used and can defend against them.

    • A man delivering a package to a woman, who is signing for the package on a mobile phone.

      Baiting

      In this activity, you will learn about baiting, how it can be used in combination with other attacks and how to defend against it.

    • A woman in overalls holding electrician equipment .

      Impersonation

      In this activity you will learn about impersonation to ensure that you are able to protect yourself against it.

    • An email at sign with a key hole in the middle

      Summary

      You have reached the end of Week 2! In this activity, you will reflect on what you have learned this week.

  • Week 3

    An Introduction to the World of Malware

    • A red skull and crossbones on a computer screen.

      Welcome to Week 3

      In these steps, you will learn what to expect in the coming week.

    • World leaders attend a meeting at the National Cyber Security Centre in 2019, London, England.

      Malware in the Real World and the Media

      In this activity, you will be introduced to a definition of malware and explore how to recognize key characteristics or indicators of compromise.

    • JULY 26, 2004: This screen grab shows a server error message widely encountered when using the Google search engine page. Google, on the verge of offering publicly-traded stock, was reportedly affected by a computer virus.

      What Is a Virus?

      In this activity, you will learn more about viruses and how to identify them, before we look at free tools available for identifying malware.

    • Computer Worm Cripples Access To South Korea's Internet

      What Are Worms?

      In this activity, you will gain an understanding of worms, and their ability to replicate and spread themselves. We will also consider a real-life example.

    • An image of a trojan horse against a backdrop of computer code.

      What Are Trojans?

      In this activity, you will gain an understanding of trojans, and how they are used as a "dropper" to get other malware onto a system.

    • BERLIN, GERMANY - JULY 25: Wearable device company Garmin experience a widespread blackout, that has left its fitness devices, website and call centers offline for 3 days.

      What Is Ransomware?

      In this activity, you will gain an understanding of ransomware, as well as learn about more real-world examples.

    • A collection of books on cybersecurity.

      Summary

      In this activity, we’ll take an overview of Week 3, the types of malware that you have learned about so far, and there will also be an opportunity to test your knowledge.

  • Week 4

    Malware Today

    • An image of code reflecting on a hacker’s glasses.

      Welcome to Week 4

      In these steps, you will find out what is in store for the week to come.

    • A cartoon image with a spyglass hovering over a pay-per-click ad.

      Adware: Unclosable Ad Traps

      In this step, you will gain an understanding of Adware, the economy behind it, and learn about real-world examples.

    • Drawn image of a spy against the background of matrix-style data.

      Spyware: Invades Devices and Steals Sensitive Information

      In this activity, you will gain an understanding of Spyware. We will look at the mercenary companies behind it, as well as learn about more real-world examples.

    • Hands hovering over a computer dashboard

      File-less Malware: Sneaks into Your Running Application

      In this activity, we will consider how file-less malware operates, and learn more about real-world instances.

    • A poster showing six wanted Russian military intelligence officers.

      The Hybrid Attack: A Combination of Different Malware

      In this activity, we will consider how file-less malware operates, and learn more about real-world instances.

    • An illustration that shows a hacker with a fishing rod, hovering over a smartphone.

      Summary

      In this activity, reflect on what you have learned during this course.

Learning on this course

On every step of the course you can meet other learners, share your ideas and join in with active discussions in the comments.

What will you achieve?

By the end of the course, you‘ll be able to...

  • Explore the nature of prevalent, and potentially catastrophic, cybersecurity attacks
  • Investigate real-world examples of various types of attacks and their outcomes
  • Explain methods to discern the various types of attacks and techniques to protect against them

Who is the course for?

This cyber security training is aimed at IT professionals who want to understand how to protect their organization from cyberattacks. This might include data administrators, those working with sensitive data, or those targeting a career in cyber security.

Who developed the course?

EC-council logo

EC-Council

International Council of E-Commerce Consultants, also known as EC-Council, is the world’s largest cyber security technical certification body.

Learning on FutureLearn

Your learning, your rules

  • Courses are split into weeks, activities, and steps to help you keep track of your learning
  • Learn through a mix of bite-sized videos, long- and short-form articles, audio, and practical activities
  • Stay motivated by using the Progress page to keep track of your step completion and assessment scores

Join a global classroom

  • Experience the power of social learning, and get inspired by an international network of learners
  • Share ideas with your peers and course educators on every step of the course
  • Join the conversation by reading, @ing, liking, bookmarking, and replying to comments from others

Map your progress

  • As you work through the course, use notifications and the Progress page to guide your learning
  • Whenever you’re ready, mark each step as complete, you’re in control
  • Complete 90% of course steps and all of the assessments to earn your certificate

Want to know more about learning on FutureLearn? Using FutureLearn