Ethical Hacking: The Complete Malware Analysis Process
Offered By: LinkedIn Learning
Course Description
Overview
Learn how to detect, analyze, and defeat different types of malware, from viruses and worms to Trojans and backdoors.
Syllabus
Introduction
- Understanding what malware is and how it behaves
- What you should know
- Types of malware
- The evolution of malware
- How malware is delivered
- How malware works
- How malware achieves persistence
- Digging into rootkits
- Automating malware with botnets
- Virus construction kits
- Contemporary malware construction
- The MITRE ATT&CK repository
- Indicators of compromise
- Checking for anomalous behavior
- Sandboxing malware
- Hiding malware
- Malware that changes its spots
- Polymorphic malware
- Using cryptography in ransomware
- Understanding advanced persistent threats
- Analyzing Win32.Sodin
- Analyzing black and grey energy
- Understanding log4shell
- Using reverse engineering to understand code
- Considering malware in families
- Automated malware analysis
- Analyzing BlackEnergy and GreyEnergy
- Analyzing packers
- Disassembly with Ghidra
- What's next
Taught by
Malcolm Shore
Related Courses
Cyber Security Foundations: Common Malware Attacks and Defense StrategiesEC-Council via FutureLearn Palo Alto Networks Cybersecurity Essentials II
Palo Alto Networks via Coursera Digital Forensics and Incident Response (DFIR): An Introduction
PA Consulting via FutureLearn CNIT 126: Practical Malware Analysis
CNIT - City College of San Francisco via Independent MacOS Dylib Injection through Mach-O Binary Manipulation
Malware Unicorn via Independent