Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Malware and Hunting for Persistence - How Adversaries Exploit Windows

Cooper via YouTube

Overview

Learn about malware persistence techniques and adversary exploitation of Windows systems in this 23-minute technical video. Explore how attackers maintain access to compromised systems, discover common persistence mechanisms used by malware, and understand the methods adversaries employ to establish long-term footholds in Windows environments. Gain valuable insights into detecting and defending against persistent threats through practical examples and real-world scenarios.

Syllabus

Malware And Hunting For Persistence: How Adversaries Exploit Your Windows? - Cocomelonc

Taught by

Cooper

Reviews

Start your review of Malware and Hunting for Persistence - How Adversaries Exploit Windows

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.