YoVDO

Ethical Hacking: The Complete Malware Analysis Process

Offered By: LinkedIn Learning

Tags

Ethical Hacking Courses Cybersecurity Courses Cryptography Courses Network Security Courses Reverse Engineering Courses Malware Analysis Courses Viruses Courses Worms Courses

Course Description

Overview

Learn how to detect, analyze, and defeat different types of malware, from viruses and worms to Trojans and backdoors.

Syllabus

Introduction
  • Understanding what malware is and how it behaves
  • What you should know
1. Introduction to Malware
  • Types of malware
  • The evolution of malware
  • How malware is delivered
  • How malware works
  • How malware achieves persistence
  • Digging into rootkits
  • Automating malware with botnets
  • Virus construction kits
  • Contemporary malware construction
  • The MITRE ATT&CK repository
2. Malware Detection
  • Indicators of compromise
  • Checking for anomalous behavior
  • Sandboxing malware
3. Advanced Techniques
  • Hiding malware
  • Malware that changes its spots
  • Polymorphic malware
  • Using cryptography in ransomware
  • Understanding advanced persistent threats
  • Analyzing Win32.Sodin
  • Analyzing black and grey energy
  • Understanding log4shell
4. Reverse Engineering Malware
  • Using reverse engineering to understand code
  • Considering malware in families
  • Automated malware analysis
  • Analyzing BlackEnergy and GreyEnergy
  • Analyzing packers
  • Disassembly with Ghidra
Conclusion
  • What's next

Taught by

Malcolm Shore

Related Courses

Microbiology and Forensic Science
Open2Study
Sicherheit im Internet
openHPI
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Tel Aviv University via edX
Compreendendo o Zika e doenças emergentes
Universidade de São Paulo via Coursera
General Microbiology
S. Kula Women’s College, Nambol, Manipur via Swayam