CISM 2022: Social Engineering & Malware

placeholder

Modern day IT device users must have an awareness of the deception by malicious actors through their devices. Recurring security awareness training in an organization is by far the most effective way to minimize realized threats against business assets.

In this course you will explore social engineering in its various forms focusing on malware types like viruses trojans and ransomware. Then you will review various examples of phishing email messages and find out how to detect that they are fraudulent. Next you will use the Metasploit Framework Social-Engineer Toolkit (SET) to execute a social engineering attack discover how botnets work and learn how their function can be mitigated. You will configure a Microsoft Windows virus and threat protection. Finally you will upload an infected file to an online service for malware scanning.

This course can be used to prepare for the Certified Information Security Manager (CISM) exam.