Ethical Hacking: The Complete Malware Analysis Process
Offered By: LinkedIn Learning
Course Description
Overview
Learn how to detect, analyze, and defeat different types of malware, from viruses and worms to Trojans and backdoors.
Syllabus
Introduction
- Understanding what malware is and how it behaves
- What you should know
- Types of malware
- The evolution of malware
- How malware is delivered
- How malware works
- How malware achieves persistence
- Digging into rootkits
- Automating malware with botnets
- Virus construction kits
- Contemporary malware construction
- The MITRE ATT&CK repository
- Indicators of compromise
- Checking for anomalous behavior
- Sandboxing malware
- Hiding malware
- Malware that changes its spots
- Polymorphic malware
- Using cryptography in ransomware
- Understanding advanced persistent threats
- Analyzing Win32.Sodin
- Analyzing black and grey energy
- Using reverse engineering to understand code
- Considering malware in families
- Automated malware analysis
- Analyzing BlackEnergy and GreyEnergy
- Analyzing packers
- Disassembly with Ghidra
- What's next
Taught by
Malcolm Shore
Related Courses
Cloud Application SecurityUniversity of Minnesota via Coursera iOS Development: Security
LinkedIn Learning Cybersecurity Awareness: Social Engineering
LinkedIn Learning The Windows Sandbox Paradox
nullcon via YouTube Defensive Security Research is Sexy Too - Real Sign of Skill
Security BSides London via YouTube