We may earn an affiliate commission when you visit our partners.
Browse similar courses
Josh Stroschein and Aaron Rosenmund

This course will teach you about the tactics and techniques of one of the most sophisticated banking Trojans currently active, Dridex.

Read more

This course will teach you about the tactics and techniques of one of the most sophisticated banking Trojans currently active, Dridex.

Cybersecurity is extremely crucial when it comes to staying ahead of the newest threats. In this course, Dridex Banking Trojan, you’ll learn all about the banking Trojan Dridex. First, you’ll explore how Dridex is delivered through phishing campaigns and social engineering and ways to prevent initial infections. Next, you’ll learn ways to detect Dridex on your networks. Finally, you’ll learn how to respond when you have discovered an active infection. When you’re finished with this course, you’ll have the skills and knowledge of Dridex needed to disrupt

This course is no longer available. Find something similar by browsing:
Dridex Banking Trojan Phishing Social Engineering Network Detection Incident Response

What's inside

Syllabus

Traffic lights

Read about what's good
what should give you pause
and possible dealbreakers
Explores the tactics and techniques of Dridex, a sophisticated banking Trojan, providing insights into its behavior and impact
Taught by Josh Stroschein and Aaron Rosenmund, both experienced security professionals, ensuring high-quality instruction
Focuses on detection, prevention, and response strategies for Dridex infections, equipping learners with practical skills to combat this threat
Provides hands-on training through labs and interactive materials, enhancing learners' understanding and retention
Suitable for cybersecurity professionals, IT administrators, and anyone interested in staying ahead of banking Trojans
Requires a sound understanding of cybersecurity fundamentals, making it less accessible to beginners in the field

Save this course

Create your own learning path. Save this course to your list so you can find it easily later.
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Dridex Banking Trojan with these activities:
Host a Study Group on Dridex
Collaborate with peers to enhance understanding of Dridex through discussions, knowledge sharing, and peer support.
Show steps
  • Recruit fellow students interested in forming a study group focused on Dridex.
  • Establish a regular meeting schedule and location.
  • Prepare discussion topics and materials to facilitate group sessions.
Simulate Dridex Infection on a Test Environment
Gain practical experience in detecting and responding to Dridex infections by simulating an attack in a controlled environment.
Show steps
  • Set up a virtual machine or test environment to simulate a vulnerable system.
  • Download and execute a Dridex sample in the simulated environment.
  • Monitor network traffic and system events to identify suspicious patterns or indicators of compromise.
  • Use security tools or techniques to detect and isolate the Dridex infection.
Develop a Dridex Detection and Response Playbook
Create a comprehensive guide to equip your organization with a structured plan to detect, contain, and mitigate Dridex infections.
Show steps
  • Identify potential Dridex infection vectors and indicators of compromise.
  • Develop procedures for network monitoring, event logging, and threat intelligence gathering.
  • Establish clear roles and responsibilities for incident response.
  • Document containment and remediation strategies.
  • Review and update the playbook regularly to keep pace with evolving threats.
Show all three activities

Career center

Learners who complete Dridex Banking Trojan will develop knowledge and skills that may be useful to these careers:
Malware Analyst
Malware Analysts investigate and analyze malware to identify its functionality and impact. They must be up-to-date on the latest cyber threats, such as the Dridex Banking Trojan. This course can help you prepare for this career.
Security Engineer
Security Engineers design, implement, and maintain security measures to protect an organization's information assets. They must be up-to-date on the latest cyber threats, such as the Dridex Banking Trojan. This course may help you prepare for this career.
Computer Forensic Analyst
Computer Forensic Analysts investigate and analyze computer systems to find evidence of criminal activity. They must be up-to-date on the latest cyber threats, such as the Dridex Banking Trojan. This course may help prepare you for this career.
Ethical Hacker
Ethical Hackers use their hacking skills to identify and fix vulnerabilities in an organization's security systems. To do this, they must stay up-to-date on the latest cyber threats, such as the Dridex Banking Trojan. This course can help you in this area.
Threat Intelligence Analyst
Threat Intelligence Analysts research and analyze threats to an organization's security. They must be up-to-date on the latest cyber threats, such as the Dridex Banking Trojan. This course may help prepare you for this role.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to improve their security posture. They must be up-to-date on the latest cyber threats, such as the Dridex Banking Trojan. This course may help you with this.
Cybersecurity Analyst
Cybersecurity Analysts defend devices, networks, and data from attackers. Understanding the tactics and techniques of viruses, such as the Dridex Banking Trojan, can help a Cybersecurity Analyst defend from an attack. This course may help further your Cybersecurity Analyst career.
Information Security Analyst
Information Security Analysts plan and implement security measures to protect an organization's information assets. They must be up-to-date on the latest cyber threats, such as the Dridex Banking Trojan. This course can help you stay up-to-date.
Incident Responder
Incident Responders are responsible for investigating and responding to security incidents. They must be aware of the latest cyber threats, such as the Dridex Banking Trojan. This course can help you prepare to become an Incident Responder.
IT Auditor
IT Auditors evaluate an organization's IT systems and processes to ensure that they are secure and compliant. They must be up-to-date on the latest cyber threats, such as the Dridex Banking Trojan. This course may help prepare you for this career.
Security Analyst
Security Analysts maintain and monitor an organization's information security systems to protect against threats. Having knowledge of banking trojans, such as the Dridex Banking Trojan, will help in becoming a Security Analyst. This course can help you gain this knowledge.
Fraud Analyst
Fraud Analysts investigate and analyze fraudulent activity. They must be up-to-date on the latest cyber threats, such as the Dridex Banking Trojan. This course may help prepare you for this career.
Security Architect
Security Architects are in charge of planning, designing, and implementing an organization's security infrastructure to protect its information assets. To do this, they must remain up-to-date on new threats, such as the Dridex Banking Trojan. This course can help you do just that and may help you become a Security Architect.
Network Security Engineer
Network Security Engineers are responsible for the security of an organization's computer networks and data. This role involves securing networks from threats, such as the Dridex Banking Trojan. This course may help you in this role.
IT Security Specialist
IT Security Specialists gather sensitive data and develop security measures to protect company assets. They will always need to stay updated in the latest cyber threats, such as the Dridex Banking Trojan, to protect their clients. This course may help prepare you for this career.

Reading list

We've selected seven books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Dridex Banking Trojan .
Provides a hands-on approach to malware analysis, including techniques for identifying and understanding malicious code. It can be valuable for understanding the inner workings of banking trojans and how to analyze them.
Covers the principles and techniques used in antivirus technologies, including detection, prevention, and remediation. It provides a solid foundation in antivirus concepts, which can be valuable for understanding how to protect against banking trojans.
Provides insights into the psychology of deception and how it is used in social engineering attacks. It can be valuable for understanding the techniques used by banking trojans to trick users into revealing sensitive information.
Provides guidance on secure coding practices, including how to avoid common vulnerabilities that can be exploited by banking trojans. It can be valuable for developers who need to understand how to write secure code.
Provides a comprehensive overview of network security, including protocols, standards, and best practices. It provides a solid foundation in network security concepts, which can be valuable for understanding how to protect networks from banking trojan attacks.
Provides an in-depth look at the internal workings of the Windows operating system. It can be valuable for understanding the operating system environment in which banking trojans operate and how to detect and disrupt them.
Provides a detailed overview of the TCP/IP protocol suite, which is the foundation of modern networking. It provides a solid foundation in networking concepts, which can be valuable for understanding how banking trojans operate and how to detect and disrupt them.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2025 OpenCourser