Malicious Office Doc Analysis for Everyone
Offered By: YouTube
Course Description
Overview
Explore malicious Office document analysis techniques in this 26-minute conference talk from Derbycon 2016. Learn why analyzing malware is important, necessary precautions, and where to obtain malware samples. Discover initial triage methods, how to use OfficeMalScanner, and perform static analysis. Gain insights into second-stage analysis, research techniques, and quick wins. Acquire valuable knowledge on malware analysis, including recommended further reading, to enhance your cybersecurity skills.
Syllabus
Intro
ROADMAP
WHY ANALYZE MALWARE?
PRECAUTIONS AND PREPARATION
WHERE DO I GET MALWARES
INITIAL TRIAGE
ROLLING UP YOUR SLEEVES OFFICEMALSCANNER
GETTING THE GOODS
STATIC ANALYSIS - NOW WE'RE HAVING FUN!
THE 2ND STAGE
DO YOUR RESEARCH
QUICK WINS
FURTHER READING
Related Courses
Foundations of Computer Science for TeachersThe University of Texas at Austin via edX Computer Forensics
Rochester Institute of Technology via edX FinTech Security and Regulation (RegTech)
The Hong Kong University of Science and Technology via Coursera Cyber Security
CEC via Swayam Fundamentos de Ciberseguridad: un enfoque práctico
Inter-American Development Bank via edX