O'Reilly logo

CEH® Certified Ethical Hacker Study Guide by Kimberly Graves

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5. Trojans, Backdoors, Viruses, and Worms

CEH EXAM OBJECTIVES COVERED IN THIS CHAPTER:

  • What is a Trojan?

  • What is meant by overt and covert channels?

  • List the different types of Trojans

  • What are the indications of a Trojan attack?

  • Understand how the "Netcat" Trojan works

  • What is meant by "wrapping"?

  • How do reverse connecting Trojans work?

  • What are the countermeasure techniques in preventing Trojans?

  • Understand Trojan evading techniques

  • Understand the differences between a virus and a worm

  • Understand the types of viruses

  • How a virus spreads and infects a system

  • Understand antivirus evasion techniques

  • Understand virus detection methods

Trojans, Backdoors, Viruses, and Worms

Viruses and worms can ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required