Companies Home Search Profile

Practical and Hands-On Malware Analysis (With Live Demos)

Focused View

Cyberworkforce365.com Llc

2:18:59

6 View
  • 1. Welcome to the Course & About Me.mp4
    01:10
  • 2. SneakPeak of Demonstrations Inside Course.mp4
    01:00
  • 3. Who is this Course for, Course Summary & Learning Objectives.mp4
    02:40
  • 1. Main Topics, What is Malware & Categories of Malware.mp4
    09:14
  • 2. Types of Malware, Malware Infection Vectors & Malware Analysis.mp4
    05:26
  • 3. Why Malware Analysis, Goals of Malware Analysis & What is Reverse Engineering.mp4
    06:35
  • 4. Software Reverse Engineering, Types of Software Reverse Engineering & Securit.mp4
    06:09
  • 5. Security-Related Reversing & Reversing in Software Development.mp4
    04:45
  • 6. Low-Level Software.mp4
    03:51
  • 7. Low-Level Software(II), Tools Needed & Precautions.mp4
    05:00
  • 8. Precautions(II) & Environment Setup (SANDBOX).mp4
    06:05
  • 1.1 SETTING UP AN ENVIRONMENT FOR MALWARE ANALYSIS.docx
  • 1. Downloading VirtualBox, the Windows VM and the Flare VM package.mp4
    05:37
  • 2. Installing VirtualBox, Extracting and Importing Windows VM & Importing and S.mp4
    07:38
  • 3. Taking Snapshots & Accessing Shared Flare VM Package.mp4
    08:40
  • 4. Installing Flare VM Package.mp4
    05:09
  • 1.1 LINK TO MALWARES AND OTHER TOOLS.html
  • 1.2 PRACTICAL STATIC ANALYSIS MANUAL.docx
  • 1. Precautions, the Tools, Getting String & Hashing.mp4
    18:00
  • 2. Generating Hashes, Using Virustotal & Using CFF Explorer.mp4
    17:38
  • 1.1 PRACTICAL DYNAMIC ANALYSIS MANUAL.docx
  • 1. Using Fakenet & Regshot.mp4
    13:36
  • 2. Using Regshot(II) & Executing Malware.mp4
    04:28
  • 3. Using Regshot(III) & Process Monitor.mp4
    06:18
  • Description


    Beginner and Intermediate Course on Malware Analysis

    What You'll Learn?


    • Fundamentals of malware concepts and malware analysis
    • Set up malware analysis lab to study the malware.
    • Practice how to conduct static analysis of malware
    • Practice how to conduct dynamic analysis of malware
    • Master different techniques that the malware uses to evade detection
    • Gain experience in working with cutting edge technologies used to analyze malware
    • Gain mastery in detection of malware agaianst organizations

    Who is this for?


  • People considering a career (or training) in cyber security
  • Computer Repairers who clean up infected machines
  • Anyone interested in learning malware analysis
  • Security Operations center (SOC) analysts interested in learning malware analysis
  • Incident responders seeking to learn about malware
  • What You Need to Know?


  • Basic windows concepts
  • Basic concepts of software and programming
  • Basic computer concepts
  • More details


    Description

    Attackers use malware as the primary weapon to exploit systems. Organizations across the globe lose millions of dollars through data breaches caused by malware creators. Hiring managers find it challenging to fill in malware positions because most security analysts have not developed malware analysis skills. This course can train you for a career in any anti-virus company worldwide or give you skills to analyze and stop breaches to organizations you work with.

    This course is intended for anyone who wants to know how malware analysis and reverse engineering of software is performed.

    This course introduces the basic concepts of malware, different types of malware, and the malware analysis process. Before moving on with practical and hands-on malware analysis, students will set up their secured lab for malware analysis. Students will get familiar with the basic techniques of static and dynamic malware analysis and will be allowed to practice all the labs.

    Students will learn to analyze malware and understand malware anatomy using various tools and techniques. The course has some hands-on sections that enable students to practice malware analysis in a virtual environment. The system helps set up their virtual lab using VirtualBox. The instructor and lab manual help students complete demos in the last area.

    By the end of the course, you'll have solid knowledge that will enable you to analyze most malware programs.

    I am looking forward to walking this journey with you and ensuring you gain mastery and expertise in malware analysis.

    Who this course is for:

    • People considering a career (or training) in cyber security
    • Computer Repairers who clean up infected machines
    • Anyone interested in learning malware analysis
    • Security Operations center (SOC) analysts interested in learning malware analysis
    • Incident responders seeking to learn about malware

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Cyberworkforce365.com Llc
    Cyberworkforce365.com Llc
    Instructor's Courses
    Cyberworkforce365 is a cybersecurity workforce development company. It trains people in hard-to-find security roles. CyberWorkforce 365 manages its clients' cybersecurity talent recruitment and development process, allowing clients to focus on their core business activities. We train and recruit the best talent and then deploy them directly into the organization, ready to hit the ground running.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 20
    • duration 2:18:59
    • Release Date 2024/02/14

    Courses related to Ethical Hacking

    Courses related to Cyber Security

    Courses related to Penetration Testing

    Courses related to Network Security

    Courses related to Information Security