Foundation of Malware and Rootkits

COM SCI X 420.11
This course covers the foundation of different types of malware and rootkits, how hackers use different techniques to gain access to systems,and malware propagation techniques, method of infections, & how to detect rootkits.
READ MORE ABOUT THIS COURSE

What you can learn.

  • Differentiate between virus, malware, and rootkits
  • Understand the propagation technique of malicious software
  • Identify rootkits and how they hide within operating systems
  • Choose the right software and hardware-based prevention technique against malware and rootkits
  • Implement security best practices within an organization to defend against any security threats

About this course:

This course covers the foundation of different types of malware and rootkits. Learn how hackers use different techniques to gain access to systems. The course also covers malware propagation techniques, method of infections, and how to detect rootkits. General security best practices and various prevention technologies such as firewalls, host-based intrusion detection systems and antivirus will also be discussed to protect against malicious software.
Suggested Prerequisites

It is advisable that you complete the following (or equivalent) since they are prerequisites for Foundation of Malware and Rootkits.

Contact Us

Our team members are here to help. Hours: Mon-Fri, 8am-5pm.

This course applies towards the following certificates & specializations…

Keep up to date on the latest news and offerings in Data Analytics & Management

vector icon of building

Corporate Education

Learn how we can help your organization meet its professional development goals and corporate training needs.

Learn More

vector icon of building

Donate to UCLA Extension

Support our many efforts to reach communities in need.

Innovation Programs

Student Scholarships

Coding Boot Camp

Lifelong Learning