Understanding Financial Malware and HOW Top Banks Protect
5.0 (3 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
22 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Understanding Financial Malware and HOW Top Banks Protect to your Wishlist.

Add to Wishlist

Understanding Financial Malware and HOW Top Banks Protect

CyberSecurity related to Financial Malware and hacking gangs
5.0 (3 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
22 students enrolled
Created by Roland Costea
Last updated 3/2017
Curiosity Sale
Current price: $10 Original price: $150 Discount: 93% off
30-Day Money-Back Guarantee
  • 5 hours on-demand video
  • 34 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Understand how financial malware works and how technology can help nowadays
  • What are the attack vectors used in financial cyberattacks
  • How top banks protect themselves and what are their challenges
View Curriculum
  • The course requires some prior knowledge regarding IT infrastructure, IT Security fundamentals, Linux, Windows, TCP/IP networking and log files

This course is designed to teach you how financial malware operates and how different scenarios are treated and handled by financial institutions using technology. Financial gain is still one of the major motivations behind most cybercriminal activities and there is little chance of this changing in the near future.

One trend that has become evident over the last year is that cybercriminals are increasingly moving beyond banking customers and are now also targeting financial institutions directly using top of the rock financial malware.

Once inside the financial institution’s network, the attacker can learn how to transfer money, issue fraudulent transactions, or orchestrate ATM machines to dispense cash, these being the end result of the financial malware.

New exploits are created every day and users are still the weakest link.

BOOST your career by understanding the mechanisms behind financial malware and what banks are looking for in choosing their anti-malware solutions.

Why do you need a financial malware training? Because you need to be able to understand how hackers think.

What you will get from this course? A complete idea about:

- financial malware history with examples

- common scenarios nowadays that involve financial malware or protection against financial malware

- how to make a business case in order to acquire financial malware protection technologies

- quick demonstration about operating financial malware

Who is the target audience?
  • This course is designed for security administrators, security analysts, security technical architects, offense managers, network administrators or any security enthusiast that wants to get security knowledge about financial malware and how it operates.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
43 Lectures
8 Lectures 48:12

In this lesson you will understand what is this course about and who is intended to watch

Preview 02:24

In this lesson you will find today challenges and what are the threats top banks should protect for

Preview 05:35

In this lesson you will understand how financial malware is distributed and who represents a target

1.3 Target and Distribution

In this lesson you will understand various attack methods hackers use in order to get financial gain

1.4 Attack Methods

1.5 Infection Vectors

In this lesson you will understand why financial institutions represent a top target

1.6 Targeted attacks against financial institutions

In this lesson you will understand how mobile banking is targeted

1.7 Mobile Platform and Email Scams

This lesson concludes today issues and current takedown operations

1.8 TakeDowns and Conclusions

Quiz section 1

Quiz section 1
4 questions
Malware History with Examples
15 Lectures 02:09:51

This lesson explains the past 3 decades of malware history (part 1)

2.1 Past 3 decades of malware (part 1)

This lesson explains the past 3 decades of malware history (part 2)

2.2 Past 3 decades of malware (part 2)

This lesson describes common architectures of financial malwares

Preview 05:40

This lesson describes Zeus Malware

2.4 Zeus

This lesson describes Zeus GameOver malware

2.5 Zeus GameOver (P2P)

This lesson describes SpyEye malware

2.6 SpyEye

This lesson describes IceIX malware

2.7 IceIX

This lesson describes Citadel malware

2.8 Citadel

This lesson describes Carberp malware

2.9 Carberp

This lesson describes ShyLock malware

2.10 Shylock

This lesson describes Bugat malware

2.11 Bugat

This lesson describes Dyre Malware

2.12 Dyre

This lesson describes Dridex malware

2.13 Dridex

This lesson describes Shifu malware

2.14 Shifu

This lesson describes Tinba malware

2.15 Tinba

Section 2 Quiz

Quiz section 2
3 questions
Making a Business Case for Financial Malware
12 Lectures 01:32:49

You will understand why risk engine is not enough for a bank

3.1 Why Fraud Risk Engines fail?

You will undertand mechanisms used to bypass authentication

3.2 How to bypass 2 factor authentication

You will understand how technology can help nowadays

Preview 08:40

You will understand any legal issues and how to comply

3.4 Compliance and Legal issues

Will this impact your customers? how?

3.5 Customer Impact

You will understand what to look for in selecting a cybercrime solution

3.6 Selecting the right cybercrime prevention solution

You will understand how financial malware can be detected

3.7 Malware Detection - intro

You will understand how financial malware can be detected

3.8 Malware Detection Advanced

You will learn things about no.1 financial alware platform by Gartner - Trusteer

3.9 Malware Detection - how technology can help?

You will see the 2nd component of Trusteer

3.10 Criminal Detection & Account Takeover

You will understand the architecture of Trusteer Account Takeover

Preview 12:07

You will have an intro about protecting mobile banking platforms

3.12 What about Mobile Banking?

Short quiz after section 3

Quiz section 3
3 questions
7 Lectures 40:01

Presenting the lab setup

4.1 Lab Setup

Simulating an XSRF attack

Preview 07:12

Using Metasploit console to run an exploit

4.3 Compromising Public Server

This lesson simulates the break-in over an windows 7 machine

4.4 Break-In: Compromising the victim computer

Simulating again web apps attacks

4.5 Other Web Application Attack Example

Locky Ransomware demo

Preview 05:58

This demo will prove how to exfiltrate data from a controlled machine

Preview 09:12
1 Lecture 02:45

Trainer conclusion

Preview 02:45
About the Instructor
Roland Costea
5.0 Average rating
4 Reviews
28 Students
2 Courses
Security Architect & Trainer

Highly motivated professional with working experience in IT Information Security Solutions evolving from technical engineer to customer oriented positions as presales/solution/enterprise architect and Information Security Leader, at big companies (> 500) in Central and Eastern Europe (Accenture, Star Storage, Teamnet WPS, IBM, Genpact). Result-oriented individual strongly focused on costumers, trying to offer the best solution based on their needs, capable of implementing complex projects under time pressure, while securing full commitment from key stakeholders.

Working as Technical Architect/Lead for IBM in the last 3 years (SEE – South East Europe region), trying Part of IBM Software Sales group and responsible for IBM Security sales productivity and deal flow by securing the “technical close”. Duties include deep understand in the Security and Cyber client needs and combines leadership skills and technical skills and requires close work with the management team to define scope and timeline and applicability meeting the business goals of the group.

Qradar is my main focus of expertise, being also a successful trainer for clients and partners in my region.

Certifications: CISSP, CISM, CRISC, TOGAF, ITIL-F, LPT, ECSA, CEH, CCNP, CCSP, CCDP, ISO 20000 Lead Auditor, ISO 27001 Lead Auditor,  IBM Security QRadar SIEM Certified.