Companies Home Search Profile

Setting Up a Malware Analysis Lab

Focused View

Tyler Hudak

1:25:21

16 View
  • 01 - Course Overview.mp4
    01:31
  • 02 - Why Build Your Own Lab.mp4
    01:43
  • 03 - Who Needs to Do This.mp4
    01:11
  • 04 - What Skills Are Required.mp4
    01:10
  • 05 - Creating a Safe Environment.mp4
    03:50
  • 06 - Choosing a Hypervisor.mp4
    02:31
  • 07 - Escaping VMs.mp4
    02:10
  • 08 - Choosing Operating Systems.mp4
    03:16
  • 09 - Evading Intelligent Malware.mp4
    01:32
  • 10 - Choosing Hardware to Use.mp4
    03:30
  • 11 - Convincing Malware Hardware Is Real.mp4
    02:47
  • 12 - Setting Up the Virtual Machine Networking.mp4
    12:15
  • 13 - Configuring the Virtual Machine Hardware Settings.mp4
    12:49
  • 14 - Adjusting to the Situation.mp4
    03:08
  • 15 - Creating a Realistic Operating System.mp4
    02:16
  • 16 - Knowing the Malware.mp4
    02:35
  • 17 - Simulating User Activity.mp4
    04:11
  • 18 - Working Around VMware Tools.mp4
    03:42
  • 19 - Deciding on Tools.mp4
    03:14
  • 20 - Using Process Explorer.mp4
    02:45
  • 21 - Using Process Monitor.mp4
    02:23
  • 22 - Using Regshot and Autoruns.mp4
    04:15
  • 23 - Using Fakenet.mp4
    04:26
  • 24 - Pivoting to Alternative Tools.mp4
    00:42
  • 25 - Preparing to Analyze Malware.mp4
    01:29
  • Description


    In this course, you’ll learn how to set up a malware analysis sandbox for discovering indicators of compromise specific to the variants of malware threatening your organization.

    What You'll Learn?


      In this course, Setting Up a Malware Analysis Lab, Aaron Rosenmund and Tyler Hudak discuss why you need to have your own malware analysis lab. There are variety of roles outside of reverse engineering that performs dynamic analysis of malware samples. Having the skills to identify the indicators of compromise make you invaluable to incident response and security operations teams. You will learn not only how to build a virtual machine, but also how to modify the operating system to properly trick the malware into believing it is in a safe place to detonate, what tools to use, and how to run them in your own malware analysis lab.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Tyler Hudak has more than 15 years of extensive real-world experience in incident handling, malware analysis, computer forensics, and information security for multiple Fortune 500 firms. He has spoken and taught at a number of security conferences on the topics of malware analysis, incident response, and penetration testing, and brings his frontl ine experience and proven techniques to bear in his training.
    Pluralsight, LLC is an American privately held online education company that offers a variety of video training courses for software developers, IT administrators, and creative professionals through its website. Founded in 2004 by Aaron Skonnard, Keith Brown, Fritz Onion, and Bill Williams, the company has its headquarters in Farmington, Utah. As of July 2018, it uses more than 1,400 subject-matter experts as authors, and offers more than 7,000 courses in its catalog. Since first moving its courses online in 2007, the company has expanded, developing a full enterprise platform, and adding skills assessment modules.
    • language english
    • Training sessions 25
    • duration 1:25:21
    • level average
    • Release Date 2023/12/08