Malicious Office Doc Analysis for Everyone
Offered By: YouTube
Course Description
Overview
Explore malicious Office document analysis techniques in this 26-minute conference talk from Derbycon 2016. Learn why analyzing malware is important, necessary precautions, and where to obtain malware samples. Discover initial triage methods, how to use OfficeMalScanner, and perform static analysis. Gain insights into second-stage analysis, research techniques, and quick wins. Acquire valuable knowledge on malware analysis, including recommended further reading, to enhance your cybersecurity skills.
Syllabus
Intro
ROADMAP
WHY ANALYZE MALWARE?
PRECAUTIONS AND PREPARATION
WHERE DO I GET MALWARES
INITIAL TRIAGE
ROLLING UP YOUR SLEEVES OFFICEMALSCANNER
GETTING THE GOODS
STATIC ANALYSIS - NOW WE'RE HAVING FUN!
THE 2ND STAGE
DO YOUR RESEARCH
QUICK WINS
FURTHER READING
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network