We may earn an affiliate commission when you visit our partners.
Josh Stroschein and Aaron Rosenmund

This course will teach you about the tactics and techniques of one of the most sophisticated banking Trojans currently active, Dridex.

Read more

This course will teach you about the tactics and techniques of one of the most sophisticated banking Trojans currently active, Dridex.

Cybersecurity is extremely crucial when it comes to staying ahead of the newest threats. In this course, Dridex Banking Trojan, you’ll learn all about the banking Trojan Dridex. First, you’ll explore how Dridex is delivered through phishing campaigns and social engineering and ways to prevent initial infections. Next, you’ll learn ways to detect Dridex on your networks. Finally, you’ll learn how to respond when you have discovered an active infection. When you’re finished with this course, you’ll have the skills and knowledge of Dridex needed to disrupt

Enroll now

What's inside

Syllabus

Course Overview
Dridex

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Explores the tactics and techniques of Dridex, a sophisticated banking Trojan, providing insights into its behavior and impact
Taught by Josh Stroschein and Aaron Rosenmund, both experienced security professionals, ensuring high-quality instruction
Focuses on detection, prevention, and response strategies for Dridex infections, equipping learners with practical skills to combat this threat
Provides hands-on training through labs and interactive materials, enhancing learners' understanding and retention
Suitable for cybersecurity professionals, IT administrators, and anyone interested in staying ahead of banking Trojans
Requires a sound understanding of cybersecurity fundamentals, making it less accessible to beginners in the field

Save this course

Save Dridex Banking Trojan to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Dridex Banking Trojan with these activities:
Host a Study Group on Dridex
Collaborate with peers to enhance understanding of Dridex through discussions, knowledge sharing, and peer support.
Show steps
  • Recruit fellow students interested in forming a study group focused on Dridex.
  • Establish a regular meeting schedule and location.
  • Prepare discussion topics and materials to facilitate group sessions.
Simulate Dridex Infection on a Test Environment
Gain practical experience in detecting and responding to Dridex infections by simulating an attack in a controlled environment.
Show steps
  • Set up a virtual machine or test environment to simulate a vulnerable system.
  • Download and execute a Dridex sample in the simulated environment.
  • Monitor network traffic and system events to identify suspicious patterns or indicators of compromise.
  • Use security tools or techniques to detect and isolate the Dridex infection.
Develop a Dridex Detection and Response Playbook
Create a comprehensive guide to equip your organization with a structured plan to detect, contain, and mitigate Dridex infections.
Show steps
  • Identify potential Dridex infection vectors and indicators of compromise.
  • Develop procedures for network monitoring, event logging, and threat intelligence gathering.
  • Establish clear roles and responsibilities for incident response.
  • Document containment and remediation strategies.
  • Review and update the playbook regularly to keep pace with evolving threats.
Show all three activities

Career center

Learners who complete Dridex Banking Trojan will develop knowledge and skills that may be useful to these careers:
Security Engineer
Security Engineers design, implement, and maintain security measures to protect an organization's information assets. They must be up-to-date on the latest cyber threats, such as the Dridex Banking Trojan. This course may help you prepare for this career.
Malware Analyst
Malware Analysts investigate and analyze malware to identify its functionality and impact. They must be up-to-date on the latest cyber threats, such as the Dridex Banking Trojan. This course can help you prepare for this career.
Ethical Hacker
Ethical Hackers use their hacking skills to identify and fix vulnerabilities in an organization's security systems. To do this, they must stay up-to-date on the latest cyber threats, such as the Dridex Banking Trojan. This course can help you in this area.
Computer Forensic Analyst
Computer Forensic Analysts investigate and analyze computer systems to find evidence of criminal activity. They must be up-to-date on the latest cyber threats, such as the Dridex Banking Trojan. This course may help prepare you for this career.
Incident Responder
Incident Responders are responsible for investigating and responding to security incidents. They must be aware of the latest cyber threats, such as the Dridex Banking Trojan. This course can help you prepare to become an Incident Responder.
Information Security Analyst
Information Security Analysts plan and implement security measures to protect an organization's information assets. They must be up-to-date on the latest cyber threats, such as the Dridex Banking Trojan. This course can help you stay up-to-date.
Cybersecurity Analyst
Cybersecurity Analysts defend devices, networks, and data from attackers. Understanding the tactics and techniques of viruses, such as the Dridex Banking Trojan, can help a Cybersecurity Analyst defend from an attack. This course may help further your Cybersecurity Analyst career.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to improve their security posture. They must be up-to-date on the latest cyber threats, such as the Dridex Banking Trojan. This course may help you with this.
Threat Intelligence Analyst
Threat Intelligence Analysts research and analyze threats to an organization's security. They must be up-to-date on the latest cyber threats, such as the Dridex Banking Trojan. This course may help prepare you for this role.
Security Analyst
Security Analysts maintain and monitor an organization's information security systems to protect against threats. Having knowledge of banking trojans, such as the Dridex Banking Trojan, will help in becoming a Security Analyst. This course can help you gain this knowledge.
Fraud Analyst
Fraud Analysts investigate and analyze fraudulent activity. They must be up-to-date on the latest cyber threats, such as the Dridex Banking Trojan. This course may help prepare you for this career.
IT Auditor
IT Auditors evaluate an organization's IT systems and processes to ensure that they are secure and compliant. They must be up-to-date on the latest cyber threats, such as the Dridex Banking Trojan. This course may help prepare you for this career.
Security Architect
Security Architects are in charge of planning, designing, and implementing an organization's security infrastructure to protect its information assets. To do this, they must remain up-to-date on new threats, such as the Dridex Banking Trojan. This course can help you do just that and may help you become a Security Architect.
Network Security Engineer
Network Security Engineers are responsible for the security of an organization's computer networks and data. This role involves securing networks from threats, such as the Dridex Banking Trojan. This course may help you in this role.
IT Security Specialist
IT Security Specialists gather sensitive data and develop security measures to protect company assets. They will always need to stay updated in the latest cyber threats, such as the Dridex Banking Trojan, to protect their clients. This course may help prepare you for this career.

Reading list

We've selected seven books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Dridex Banking Trojan .
Provides a hands-on approach to malware analysis, including techniques for identifying and understanding malicious code. It can be valuable for understanding the inner workings of banking trojans and how to analyze them.
Covers the principles and techniques used in antivirus technologies, including detection, prevention, and remediation. It provides a solid foundation in antivirus concepts, which can be valuable for understanding how to protect against banking trojans.
Provides insights into the psychology of deception and how it is used in social engineering attacks. It can be valuable for understanding the techniques used by banking trojans to trick users into revealing sensitive information.
Provides guidance on secure coding practices, including how to avoid common vulnerabilities that can be exploited by banking trojans. It can be valuable for developers who need to understand how to write secure code.
Provides a comprehensive overview of network security, including protocols, standards, and best practices. It provides a solid foundation in network security concepts, which can be valuable for understanding how to protect networks from banking trojan attacks.
Provides an in-depth look at the internal workings of the Windows operating system. It can be valuable for understanding the operating system environment in which banking trojans operate and how to detect and disrupt them.
Provides a detailed overview of the TCP/IP protocol suite, which is the foundation of modern networking. It provides a solid foundation in networking concepts, which can be valuable for understanding how banking trojans operate and how to detect and disrupt them.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Dridex Banking Trojan .
Active Directory and Entra ID: The Big Picture
Service Design Service Blueprints
Installing and Configuring Windows Server 2019 ADCS
PowerShell Playbook: Automating Active Directory
Implement Windows Server 2019 Identity Federation and...
Implement JIT and JEA Administration in Windows Server...
Specialized Hunts: Threat Hunting within Active Directory
Troubleshooting Security and Active Directory Issues with...
Active Defense with PowerShell
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser