Publication date : 06/06/2024

Course : Protecting yourself against viruses and malware in the Microsoft environment

Practical course - 2d - 14h00 - Ref. MAL
Price : 1370 € E.T.

Protecting yourself against viruses and malware in the Microsoft environment




This training course details the computer viruses and malware that degrade computer operation and disrupt business activity. At the end of the course, you'll be able to set up an approach, choose the best techniques and use the right tools to detect and eradicate them.


INTER
IN-HOUSE
CUSTOM

Practical course in person or remote class
Disponible en anglais, à la demande

Ref. MAL
  2d - 14h00
1370 € E.T.




This training course details the computer viruses and malware that degrade computer operation and disrupt business activity. At the end of the course, you'll be able to set up an approach, choose the best techniques and use the right tools to detect and eradicate them.


Teaching objectives
At the end of the training, the participant will be able to:
Identify and neutralize malware or viruses
Distinguishing infection from dysfunction
Use the right tools to detect and eradicate them
Draw up an action plan in line with the company's needs

Intended audience
System/network/security technicians, administrators and engineers.

Prerequisites
Good knowledge of networked Windows workstation management.

Practical details
Hands-on work
Workstations running Windows 10 and Windows Server 2016 will be used to put the concepts presented into practice.

Course schedule

1
Basic concepts

  • What are viral infections?
  • Defining the virus concept. The right tools.
  • The jungle of names (backdoor, worm, Trojan horse, bot/botnet...).
  • General principles of threat operation.
  • The most common infection vectors.
  • Disabling and bypassing safety devices.
Hands-on work
Infection analysis (backdoor, rootkit, etc.). Spyware and phishing.

2
How can I protect myself? Antivirus and Firewall

  • Operating principles.
  • Types of detection (signature, heuristic, behavioral, etc.).
  • Packers (UPX, FSG, Upack, Armadillo, Themida...).
  • False alarms.
  • Firewall overview. The right tools.
  • What can it detect?
  • What are its limits?
Hands-on work
Detection test with the different types and bypassing of a firewall.

3
Mechanisms of infection

  • How programs work.
  • The relationship with DLLs.
  • Code injections.
  • How to detect a boot infection? The right tools.
  • Windows startup reminder.
  • The right tools.
  • Infections and the registry.
Hands-on work
Example of viral injection. Simulation of malicious code in start-up phase and eradication techniques.

4
Identify for better eradication

  • The importance of identifying the threat.
  • Use the most appropriate tool: Windows Defender, competing tools.
  • Eradicate "the eternal return".
  • Remove inactive residues.
Hands-on work
Using scripts to counter infections. How to identify sources of infection? Eradicate without formatting.

5
Prevention rather than cure

  • Raising user awareness.
  • Procedures to be implemented.
  • Choosing your security systems.
  • Backups and restore points.
  • Choosing the right tools.
  • Market solutions and the antivirus appliance.
Hands-on work
Identify the stages in a company action plan.


Customer reviews
5 / 5
Customer reviews are based on end-of-course evaluations. The score is calculated from all evaluations within the past year. Only reviews with a textual comment are displayed.
SÉBASTIEN A.
20/10/25
5 / 5

The module should be extended to 3 days to allow time for a lot of practical work.



Dates and locations
Select your location or opt for the remote class then choose your date.
Remote class

Dernières places
Date garantie en présentiel ou à distance
Session garantie

REMOTE CLASS
2026 : 26 Mar., 11 June, 22 Oct.

PARIS LA DÉFENSE
2026 : 26 Mar., 11 June, 22 Oct.