Comparing Threats, Vulnerabilities, and Common AttacksYou must be logged in to view this content. Course Content Expand All | Collapse All Lessons Status 1 Introduction 2 Understanding Threat Actors 3 Determining Malware Types Viruses/Worms/Logic Bombs/Backdoors Trojans/RAT/Ransomware Keylogger/Spyware/Adware/Bots and Botnets/Rootkits 4 Recognizing Common Attacks Social Engineering Attacks via Email and Phone (Spam/Whaling/Vishing) Attacks via Email and Phone (Phishing/Spear Phishing) One Click Lets Them In 5 Blocking Malware and Other Attacks Protecting Systems from Malware Antivirus and Anti-Malware Software Data Execution Prevention/Advanced Malware Tools/Spam Filters Educating Users Why Social Engineering Works 6 Comparing Threats, Vulnerabilities, and Common Attacks Exam Topic Review