Lesson Notes

Threat Landscape: Trojan Horse

Module 2: Threat Landscape. Trojan horse attacks: disguised malware, delivery mechanisms, and how to recognise and defend against them. Builds on malware and social engineering concepts.

Module 2: Threat Landscape — Trojan Horse

Trojan horse attacks use malware disguised as legitimate software. This lesson covers how trojans are delivered, how to recognise them, and how to defend. Builds on malware and social engineering concepts.

Key Takeaway for Lesson 10

Trojans rely on deception. Recognise delivery mechanisms and apply defence in depth. Next: Intro to Networks.