Chapter 11

Network and Endpoint Malware Detection and Remediation

This chapter covers the following topics:

Beyond understanding malware, you need to know how it is detected and responded to. Numerous strategies exist for generating malware signatures (unique identifiers), and antimalware tools employ signatures in different ways. This chapter helps you develop a fundamental understanding of how malware is caught and the best practices for eliminating it from endpoints.

This chapter covers information ...

Get Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.