The Art of Post-Infection Response and Mitigation
Offered By: YouTube
Course Description
Overview
Explore the intricacies of post-infection response and mitigation strategies in this 51-minute conference talk from BSides Tampa 2015. Delve into the world of cybersecurity as Caleb Crable shares insights on malware breach response, ruble analysis, and memory dump techniques. Learn about manual malware extraction, battle planning, and the effective use of tools like Process Explorer. Discover how to identify hooked files, examine process properties, and create comprehensive examination reports. Gain valuable knowledge on various cybersecurity tools and techniques to enhance your ability to respond to and mitigate infections in the ever-evolving landscape of digital threats.
Syllabus
Introduction
Why wouldnt something go wrong
About Caleb
The Great Infection World
Antivirus
Mauer
Lack of Exposure
Malware Breach Response
Ruble Analysis
Memory Dump
Manual Malware Extraction
Battle Planning
Process Explorer
Hooked Files
Process Explorer Properties
Dump Memory
Tool Research
Examination Report
Other Tools
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network