YoVDO

Indicators of Compromise - From Malware Analysis to Eradication

Offered By: 44CON Information Security Conference via YouTube

Tags

44CON Courses Cybersecurity Courses Network Security Courses Malware Analysis Courses

Course Description

Overview

Explore a comprehensive workshop that guides you through the process of identifying, analyzing, and eradicating unknown malware from corporate networks. Learn how to locate suspicious software, conduct thorough malware analysis, and identify crucial indicators of compromise. Discover techniques for effectively removing malware from enterprise systems using freely available tools, some of which may already be part of your existing security infrastructure. Gain valuable insights from security expert Michael Boman as he presents this 1-hour and 24-minute session at the 44CON Information Security Conference, equipping you with practical skills to enhance your organization's cybersecurity defenses.

Syllabus

Indicators of Compromise From malware analysis to eradication Presented By Michael Boman Workshop


Taught by

44CON Information Security Conference

Related Courses

Supply Chain Unchained - How To Be A Bad SaaS
44CON Information Security Conference via YouTube
Aviation Security 101
44CON Information Security Conference via YouTube
The Anti-Checklist Manifesto
44CON Information Security Conference via YouTube
Why Are We Still Doing Authentication Wrong?
44CON Information Security Conference via YouTube
What Do Hackers See When They Look at the Clouds
44CON Information Security Conference via YouTube