Understanding Financial Malware and HOW Top Banks Protect
5.0 (3 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
22 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Understanding Financial Malware and HOW Top Banks Protect to your Wishlist.

Add to Wishlist

Understanding Financial Malware and HOW Top Banks Protect

CyberSecurity related to Financial Malware and hacking gangs
5.0 (3 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
22 students enrolled
Created by Roland Costea
Last updated 3/2017
English
Curiosity Sale
Current price: $10 Original price: $150 Discount: 93% off
30-Day Money-Back Guarantee
Includes:
  • 5 hours on-demand video
  • 34 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Understand how financial malware works and how technology can help nowadays
  • What are the attack vectors used in financial cyberattacks
  • How top banks protect themselves and what are their challenges
View Curriculum
Requirements
  • The course requires some prior knowledge regarding IT infrastructure, IT Security fundamentals, Linux, Windows, TCP/IP networking and log files
Description

This course is designed to teach you how financial malware operates and how different scenarios are treated and handled by financial institutions using technology. Financial gain is still one of the major motivations behind most cybercriminal activities and there is little chance of this changing in the near future.

One trend that has become evident over the last year is that cybercriminals are increasingly moving beyond banking customers and are now also targeting financial institutions directly using top of the rock financial malware.

Once inside the financial institution’s network, the attacker can learn how to transfer money, issue fraudulent transactions, or orchestrate ATM machines to dispense cash, these being the end result of the financial malware.

New exploits are created every day and users are still the weakest link.

BOOST your career by understanding the mechanisms behind financial malware and what banks are looking for in choosing their anti-malware solutions.

Why do you need a financial malware training? Because you need to be able to understand how hackers think.

What you will get from this course? A complete idea about:

- financial malware history with examples

- common scenarios nowadays that involve financial malware or protection against financial malware

- how to make a business case in order to acquire financial malware protection technologies

- quick demonstration about operating financial malware



Who is the target audience?
  • This course is designed for security administrators, security analysts, security technical architects, offense managers, network administrators or any security enthusiast that wants to get security knowledge about financial malware and how it operates.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
43 Lectures
05:13:38
+
Introduction
8 Lectures 48:12

In this lesson you will understand what is this course about and who is intended to watch

Preview 02:24

In this lesson you will find today challenges and what are the threats top banks should protect for

Preview 05:35

In this lesson you will understand how financial malware is distributed and who represents a target

1.3 Target and Distribution
06:19

In this lesson you will understand various attack methods hackers use in order to get financial gain

1.4 Attack Methods
06:47

1.5 Infection Vectors
05:55

In this lesson you will understand why financial institutions represent a top target

1.6 Targeted attacks against financial institutions
05:20

In this lesson you will understand how mobile banking is targeted

1.7 Mobile Platform and Email Scams
09:28

This lesson concludes today issues and current takedown operations

1.8 TakeDowns and Conclusions
06:24

Quiz section 1

Quiz section 1
4 questions
+
Malware History with Examples
15 Lectures 02:09:51

This lesson explains the past 3 decades of malware history (part 1)

2.1 Past 3 decades of malware (part 1)
06:48

This lesson explains the past 3 decades of malware history (part 2)

2.2 Past 3 decades of malware (part 2)
10:52

This lesson describes common architectures of financial malwares

Preview 05:40

This lesson describes Zeus Malware

2.4 Zeus
12:35

This lesson describes Zeus GameOver malware

2.5 Zeus GameOver (P2P)
11:15

This lesson describes SpyEye malware

2.6 SpyEye
11:03

This lesson describes IceIX malware

2.7 IceIX
08:29

This lesson describes Citadel malware

2.8 Citadel
10:48

This lesson describes Carberp malware

2.9 Carberp
07:25

This lesson describes ShyLock malware

2.10 Shylock
07:33

This lesson describes Bugat malware

2.11 Bugat
02:55

This lesson describes Dyre Malware

2.12 Dyre
11:14

This lesson describes Dridex malware

2.13 Dridex
10:13

This lesson describes Shifu malware

2.14 Shifu
07:06

This lesson describes Tinba malware

2.15 Tinba
05:55

Section 2 Quiz

Quiz section 2
3 questions
+
Making a Business Case for Financial Malware
12 Lectures 01:32:49

You will understand why risk engine is not enough for a bank

3.1 Why Fraud Risk Engines fail?
08:23

You will undertand mechanisms used to bypass authentication

3.2 How to bypass 2 factor authentication
07:17

You will understand how technology can help nowadays

Preview 08:40

You will understand any legal issues and how to comply

3.4 Compliance and Legal issues
04:45

Will this impact your customers? how?

3.5 Customer Impact
05:57

You will understand what to look for in selecting a cybercrime solution

3.6 Selecting the right cybercrime prevention solution
13:36

You will understand how financial malware can be detected

3.7 Malware Detection - intro
03:48

You will understand how financial malware can be detected

3.8 Malware Detection Advanced
05:43

You will learn things about no.1 financial alware platform by Gartner - Trusteer

3.9 Malware Detection - how technology can help?
07:06

You will see the 2nd component of Trusteer

3.10 Criminal Detection & Account Takeover
05:39

You will understand the architecture of Trusteer Account Takeover

Preview 12:07

You will have an intro about protecting mobile banking platforms

3.12 What about Mobile Banking?
09:48

Short quiz after section 3

Quiz section 3
3 questions
+
DEMO
7 Lectures 40:01

Presenting the lab setup

4.1 Lab Setup
02:58

Simulating an XSRF attack

Preview 07:12

Using Metasploit console to run an exploit

4.3 Compromising Public Server
07:27

This lesson simulates the break-in over an windows 7 machine

4.4 Break-In: Compromising the victim computer
02:58

Simulating again web apps attacks

4.5 Other Web Application Attack Example
04:16

Locky Ransomware demo

Preview 05:58

This demo will prove how to exfiltrate data from a controlled machine

Preview 09:12
+
Conclusion
1 Lecture 02:45

Trainer conclusion

Preview 02:45
About the Instructor
Roland Costea
5.0 Average rating
4 Reviews
28 Students
2 Courses
Security Architect & Trainer

Highly motivated professional with working experience in IT Information Security Solutions evolving from technical engineer to customer oriented positions as presales/solution/enterprise architect and Information Security Leader, at big companies (> 500) in Central and Eastern Europe (Accenture, Star Storage, Teamnet WPS, IBM, Genpact). Result-oriented individual strongly focused on costumers, trying to offer the best solution based on their needs, capable of implementing complex projects under time pressure, while securing full commitment from key stakeholders.

Working as Technical Architect/Lead for IBM in the last 3 years (SEE – South East Europe region), trying Part of IBM Software Sales group and responsible for IBM Security sales productivity and deal flow by securing the “technical close”. Duties include deep understand in the Security and Cyber client needs and combines leadership skills and technical skills and requires close work with the management team to define scope and timeline and applicability meeting the business goals of the group.

Qradar is my main focus of expertise, being also a successful trainer for clients and partners in my region.

Certifications: CISSP, CISM, CRISC, TOGAF, ITIL-F, LPT, ECSA, CEH, CCNP, CCSP, CCDP, ISO 20000 Lead Auditor, ISO 27001 Lead Auditor,  IBM Security QRadar SIEM Certified.