YoVDO

Malware Analysis

Offered By: HackerSploit via YouTube

Tags

Malware Analysis Courses Static Analysis Courses Malware Classification Courses

Course Description

Overview

Dive into the world of malware analysis through this comprehensive tutorial playlist. Learn the fundamentals of malware analysis, set up a secure sandbox environment, and master static analysis techniques. Explore file type identification, hash generation, string extraction, and packer analysis. Gain insights into PE header structure and analysis, resource section examination, and malware classification. Create YARA rules for malware detection and apply your skills to real-world scenarios, including analysis of the infamous Stuxnet malware using Ghidra. Enhance your cybersecurity expertise with hands-on exercises and practical examples throughout this in-depth malware analysis bootcamp.

Syllabus

Malware Analysis Bootcamp - Introduction To The Course.
Malware Analysis Bootcamp - Introduction To Malware Analysis.
Malware Analysis Bootcamp - Setting Up Our Environment.
How To Setup A Sandbox Environment For Malware Analysis.
Malware Analysis Bootcamp - Introduction To Static Analysis.
Malware Analysis Bootcamp - File Type Identification.
Malware Analysis Bootcamp - Generating Malware Hashes.
Malware Analysis Bootcamp - Extracting Strings.
Malware Analysis Bootcamp - Packers & Unpacking.
Malware Analysis Bootcamp - Understanding The PE Header.
Malware Analysis Bootcamp - Analyzing The PE Header.
Malware Analysis Bootcamp - Examining The Resources Section.
Malware Analysis Bootcamp - Malware Classification And Identification.
Malware Analysis Bootcamp - Creating YARA Rules.
Flare-On FireEye 2018 CTF - Malware Analysis With Amr Thabet - Flare Minesweeper.
Malware Analysis With Ghidra - Stuxnet Analysis.


Taught by

HackerSploit

Related Courses

CNIT 126: Practical Malware Analysis
CNIT - City College of San Francisco via Independent
Reverse Engineering 101
Malware Unicorn via Independent
Reverse Engineering 102
Malware Unicorn via Independent
Developing Secure Software
LinkedIn Learning
Ethical Hacking: Mobile Devices and Platforms
LinkedIn Learning