Overview

Introduction

The Trojan Protection module provides you with the instructions and devices to develop your hands-on skills in the following topics.

  • Use malware and Trojan analysis tools
  • Monitor ports and processes
  • Monitor and protect files and folders

Lab time: It will take approximately 1 hour to complete this lab.

Objectives

The following objectives are covered in this lab.

  • System Hacking

Exercise 1 - Use Malware and Trojan Analysis Tools

Every day, thousands of malware are released by the hackers. These malware are designed to work in different ways. Some are not harmful and cause minimal damage and others are extremely chaotic in nature. You can use different types of malware and Trojan analysis tools to ensure their impact is reduced or minimized.

Exercise 2 - Monitor Ports and Processes

In this exercise, you will learn the following:

Port Monitoring Tools: TCPView and CurrPorts To gain better understanding of these tasks, please refer to your course material or use your preferred search engine to research this topic in greater detail.

Exercise 3 - Monitor and Protect Files and Folders

You will now have a look at a different variety of algorithms in a direct comparison and using Hash Calc which is a calculator that computes message digests, checksums, and HMACs for files, as well as for text and hex strings. It provides 13 popular hash and checksum algorithms for calculations.

In this exercise, you will learn the following:

  • Install of Hash Calc
  • Using Hash Calc

Comprehensive Learning

See the full benefits of our immersive learning experience with interactive courses and guided career paths.