YoVDO

Practical: Malware Analysis and Investigations

Offered By: PA Consulting via FutureLearn

Tags

Malware Analysis Courses Cybersecurity Courses Digital Forensics Courses Incident Response Courses Network Traffic Analysis Courses Dynamic Analysis Courses Static Analysis Courses

Course Description

Overview

Apply investigative methodology to malware

This five-week course will help you put your knowledge from the Digital Forensics and Incident Response (DFIR) Expert Track into practice.

You’ll learn to use investigation methodology in the context of malware to understand the practical steps to take to prevent a malware attack.

By exploring different analysis environments, you’ll learn how to set up the right kind of environment in order to extract the most information about the malicious software.

Learn how to detect network connections and collect network traffic

Malware is typically delivered over a network, so an understanding of network connections is vital in helping you prevent an attack.

You’ll explore practical methods to find malware connectivity, as well as the importance of collecting network traffic – the amount of data moving across a computer network.

Explore volatile vs static analysis

You’ll identify different types of malware analysis, such as volatile and static, to further your understanding of malware and the impact it can have on a system.

You’ll learn how to find suspect processes and files, and how to discover malware persistence mechanisms to help you remove malware as quickly and effectively as possible, should an attack occur.

By the end of the course, you’ll feel confident in applying your knowledge to practical situations to further your skills as a digital forensic investigator or cyber security incident responder.

This course is designed for anyone who has completed the Digital Forensics and Incident Response (DFIR) Expert Track.

It will help you gain an understanding of malware analysis to help protect your organisation from an attack.


Syllabus

  • Practical Malware Investigations
    • ExpertTrack Courses
    • Welcome to the course
    • Week one introduction
    • Quiz - Let's test your cyber knowledge
    • Malware states
    • Analysis environments
    • Investigation methodology
    • End of week test
  • How to find malware connectivity
    • Week two introduction
    • Ports (Malware connectivity)
    • End of week two
  • How to find suspect processes
    • Week three introduction
    • Malicious processes
    • End of week three
  • How to find suspect files
    • Week four introduction
    • Finding suspect files
    • End of week
  • How to find malware persistance
    • Week five introduction
    • Malware persistance
    • End of week five

Taught by

Jim Metcalfe

Related Courses

FinTech for Finance and Business Leaders
ACCA via edX
Access Controls
(ISC)² via Coursera
Advanced Cyber Security Training
EC-Council via FutureLearn
Python для кибербезопасности. Финальный проект
E-Learning Development Fund via Coursera
Advanced System Security Design
University of Colorado System via Coursera