Week 4 Online learnig

Week 4. Malware and Advanced Persistent Threats (APTs)


An advanced persistent threat is an attack in which an unauthorized user gains access to your system or network and remains there without being detected. Advanced persistent threats are particularly dangerous for large companies, as hackers have ongoing access to all of the company’s data. Advanced persistent threats generally may cause damage to company’s or your networks and local machines. Instead, the often data theft.


This week included “reading, lecture videos and exams” based on the dangers and types of (APTs).

Worms, Virus, Rootkits, Trojan horses: Trojans, Ransomware and Spyware.

  1. Malware can behave in many different ways, so it is nearly impossible to establish a common pattern.
  2. General rules to detect malware.

For example, you may notice slow speed in your computer when surfing the Internet or

working with files. Another symptom are network connections errors. In short if your system/computer is not protected than you may be in danger of a Malware attack.





Here is an article showing how dangerous (APTs) can be.


Hints of the APT—short for advanced persistent threat—group first emerged in April 2017. That's when a still-unidentified group calling itself the Shadow Brokers published exploits and code developed by, and later stolen from, the NSA. Titled "Lost in Translation," the dispatch was best known for publishing the Eternal Blue exploit that would later power the WannaCry and NotPetya worms that caused tens of billions of dollars' worth of damage worldwide. But the dump included something else: a script that checked compromised computers for malware from a variety of APTs.



Still no hands on projects. I was hoping to practices some encryptions/decryptions technique or VPNs at this point of the course. I’m not looking ahead at the courses layout, only because I’m certified in Network Security. So, I want to be surprised with some new. The good news is that there is more “learning to do”. This is a very informative course, its layout well. From lecture videos, resources to relating articles. This is a good course not great, but for a first time cybersecurity learner; I believe that this is a worthy venture.