Companies Home Search Profile

Advanced Malware Analysis: Redux

Focused View

Cybrary

3:40:59

116 View
  • 01 - Module 1 objectives.mp4
    04:53
  • 02 - Reverse engineering process review.mp4
    06:46
  • 03 - Malware analysis tools.mp4
    04:24
  • 04 - Malware handling.mp4
    04:23
  • 05 - Malware components part 1 Windows OS.mp4
    07:29
  • 06 - Malware components part 2 PE files and memory.mp4
    14:54
  • 07 - Malware components part 3 WinAPI and Registry.mp4
    09:18
  • 08 - Malware components part 4 Malware behaviors.mp4
    06:58
  • 09 - Module 1 summary.mp4
    00:58
  • 01 - Module 2 objectives.mp4
    00:39
  • 02 - Numbering systems.mp4
    09:18
  • 03 - Computer architecture part 1 x86x64.mp4
    08:14
  • 04 - Computer architecture part 2 Assembly Language.mp4
    10:46
  • 05 - Computer architecture part 3 Control flow and stack.mp4
    10:39
  • 06 - Module 2 summary.mp4
    01:03
  • 01 - Module 3 objectives.mp4
    01:13
  • 02 - Dynamic analysis process part 1.mp4
    01:58
  • 03 - Dynamic analysis process part 2.mp4
    13:46
  • 04 - Dynamic analysis process part 3 Advanced analysis.mp4
    08:54
  • 05 - Static analysis part 1.mp4
    17:09
  • 06 - Static analysis part 2.mp4
    13:56
  • 07 - Module 3 summary.mp4
    01:18
  • 01 - Module 4 objectives.mp4
    00:38
  • 02 - Malware packers part 1.mp4
    05:08
  • 03 - Malware packers part 2.mp4
    07:22
  • 04 - Obfuscation part 1.mp4
    04:10
  • 05 - Obfuscation part 2 XOR.mp4
    04:46
  • 06 - Obfuscation part 3 base64.mp4
    05:31
  • 07 - Identifying encryption.mp4
    04:45
  • 08 - Anti-analysis part 1.mp4
    03:56
  • 09 - Anti-analysis part 2.mp4
    05:22
  • 10 - Module 4 summary.mp4
    01:09
  • 01 - Module 5 objectives.mp4
    00:43
  • 02 - Forensics process.mp4
    02:39
  • 03 - Memory analysis part 1.mp4
    03:44
  • 04 - Memory analysis part 2.mp4
    09:25
  • 05 - Module 5 summary.mp4
    00:56
  • 06 - Course summary.mp4
    01:49
  • Description


    Do you have knowledge of malware analysis core concepts, but want to transition from malware analyst to reverse engineer? Brian Rogalski, CEO of Hexcapes, equips you to handle complex tasks such as extracting, debugging, disassembling, unpacking, and hunting malware as he reacquaints you with key analysis topics and exercises. Get ready for the rest of the course with a review of Windows OS, PE files and memory, WinAPI and Registry, and common malware behaviors. Go over x86 and x64 architecture, and then dive into dynamic and static malware analysis. Explore malware challenges, including malware packers, obfuscation, identifying encryption, anti-analysis, and memory analysis. This course helps you gain the hands-on experience you need to level up.

    This course was created by Cybrary. We are pleased to host this training in our library.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 38
    • duration 3:40:59
    • English subtitles has
    • Release Date 2023/11/16