Introduction

This module will cover Remote Access Trojans (RATs) and Rootkits, which are tools commonly used by attackers to gain unauthorized access to systems and maintain their control over them. Students will learn about the features and functionalities of these tools, how they are used in real-world attacks, and the techniques and tools used to detect and defend against them.

Learning Objectives

  • Explain what RATs and Rootkits are and how they work

  • Describe the common features and functionalities of RATs and Rootkits

  • Analyze real-world RAT and Rootkit attacks and identify the techniques used by attackers

  • Implement and use tools to detect and defend against RATs and Rootkits

Topics Covered

  1. Introduction to RATs and Rootkits

  2. Features and functionalities of RATs and Rootkits

  3. Real-world RAT and Rootkit attacks

  4. Detection and defense against RATs and Rootkits

By the end of this module, students should have a solid understanding of RATs and Rootkits, their functionalities, and the techniques and tools used to detect and defend against them.

Last updated