Take this
course

Software Development / Security & Encryption

Spyware & Keyloggers

Take a closer look into the three different types of keyloggers that we see used in today's environments: hardware, software, and kernel/driver keyloggers.

Description

In this Spyware & Keyloggers course you will take a good look at spyware, the activities it performs, different types of spyware, and the countermeasures needed in order to prevent hackers from utilizing these types of techniques against your company. 


You will also spend time studying different types of keyloggers. There are three different types of keyloggers that we see used in today's environments: hardware, software, and kernel/driver keyloggers. A good pen tester or ethical hacker cannot perform his or her job properly without understanding the countermeasures for all of the hacking techniques used against today's computer systems.


Overall, these topics will help prepare you for certification exams from vendors, such as Linux, CompTIA, and EC-Council


Topics Covered Include:

  • Spyware Uncovered
  • Keyloggers 

Take Advantage of our extra downloadable supplemental materials. 

**This .zip file includes PDF versions of our Script, PPT Slides, Quiz Questions, and vocabulary tools to better enhance your understanding for Spyware & Keyloggers.

Full details

Curriculum

  • Spyware Uncovered
    Introduction
    7:25
    Spyware Distribution
    14:00
    Knowledge Check
    0:43
  • Keyloggers
    Understanding Keyloggers
    1:34
    Hardware Keyloggers
    3:27
    Software Keylogger
    2:55
    Keylogger Examples
    11:28
    Kernel Keyloggers
    1:44
    Protecting Yourself
    14:14
    Knowledge Check
    0:37
  • Conclusion
    Summary
    1:01
    Spyware & Keyloggers: Supplemental Materials
    Take advantage of all our extra downloadable supplemental materials. This .zip file includes PDF versions of our Script, PPT Slides, Quiz Questions, and vocabulary tools to better enhance your understanding for Spyware & Keyloggers Chapters 1 & 2.

Skills

  • Information Systems Security
  • IT Security
  • Information Security
  • Certified Ethical Hacker (CEH)
  • CompTIA Security+
  • IT Certification
  • IT Security Certification

Similar Courses

More Courses by this Instructor