C Aptitude For IT Campus

Preview:

DESCRIPTION

It contain number of small program

Citation preview

Job Description

Associate Threat Research Engineer

(Malware Analyst)

• Examine, identify, and understand the nature of cyber-threats such as viruses, worms, bots, rootkits, and Trojan horses.

• Perform research of malicious software and exploitation tactics.

• Provide a detail-oriented technical report of the malware, identification parameters and advanced capabilities.

Key Skills

• C• C++• Operating Systems• Networking

Module – I

Malware

Internet-The Black Side

Introduction to

Malwares

What is Malwares?

• Malware is for “Malicious Software”.

Examples of Malwares

Examples of Malwares

• Virus

• Worms

• Trojan Horses

Examples of Malwares

• Virus

• Worms

• Trojan Horses

Examples of Malwares

• Virus

• Worms

• Trojan Horses

Trojan Horses

How to protect your computer from Malware…???

How to protect your computer from Malware…???

• Make sure automatic updating is turned on to get all the latest

security updates.

• Keep your firewall turned on.

• Don't open spam email messages or click links on suspicious

websites.

• Download Microsoft Security Essentials, which is free, or another

reputable antivirus and anti-malware program .

• Scan your computer with the Microsoft Safety Scanner.

Warning• Cybercriminals sometimes try to trick you into downloading rogue

(fake) security software that claims to protect you against malware.

This rogue security software might ask you to pay for a fake

product, install malware on your computer, or steal your personal

information.

• Don't click links in email messages and avoid websites that offer

free software—especially free antivirus software.

End of Module - I

Recommended