Now that you have an idea of the different classes of malware, the different
technologies used to deploy malware, the different protective mechanisms
malware employs to protect itself, and the different dependencies malware has to
execute properly in a target system, you are ready to tackle malware.