Introduction
This module will cover Remote Access Trojans (RATs) and Rootkits, which are tools commonly used by attackers to gain unauthorized access to systems and maintain their control over them. Students will learn about the features and functionalities of these tools, how they are used in real-world attacks, and the techniques and tools used to detect and defend against them.
Learning Objectives
Explain what RATs and Rootkits are and how they work
Describe the common features and functionalities of RATs and Rootkits
Analyze real-world RAT and Rootkit attacks and identify the techniques used by attackers
Implement and use tools to detect and defend against RATs and Rootkits
Topics Covered
Introduction to RATs and Rootkits
Features and functionalities of RATs and Rootkits
Real-world RAT and Rootkit attacks
Detection and defense against RATs and Rootkits
By the end of this module, students should have a solid understanding of RATs and Rootkits, their functionalities, and the techniques and tools used to detect and defend against them.
Last updated