Learn Excel & Financial Modeling the Way Finance Teams Actually Use Them
PowerBI Data Analyst - Create visualizations and dashboards from scratch
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Learn about malware persistence techniques and adversary exploitation of Windows systems in this 23-minute technical video. Explore how attackers maintain access to compromised systems, discover common persistence mechanisms used by malware, and understand the methods adversaries employ to establish long-term footholds in Windows environments. Gain valuable insights into detecting and defending against persistent threats through practical examples and real-world scenarios.
Syllabus
Malware And Hunting For Persistence: How Adversaries Exploit Your Windows? - Cocomelonc
Taught by
Cooper