Malware Analysis
Offered By: YouTube
Course Description
Overview
Syllabus
Olympic Destroyer - Quick behavioural Analysis of this Wiper Malware.
Analysing Obfuscated VBA - Extracting indicators from a Trickbot downloader.
Analysing an Emotet Downloader with CMD Watcher and CyberChef.
WannaCry Ransomware - Revisited. Behavioural and Static Analysis Techniques.
Live Stream - Part 2 - Emotet Downloader Analysis.
Live Stream - Finding Emotet's Config.
Excel 4.0 Macros Analysis - Cobalt Strike Shellcode Injection.
COVID19 Malware - Getting Closer to the Bad Guys.
Crack The BAT - Identifying Compression, Packers & Googling for IOCs.
Wrangle with Hangul - Analysis of a malicious hwp document.
SUNBURST SolarWinds Malware - Tools, Tactics and Methods to get you started with Reverse Engineering.
SUNBURST SolarWinds RECON - Malware Reverse Engineering, OSINT and Identifying Victims.
SUPERNOVA - Everything you need to know to Reverse Engineer an APT WebShell.
JNLP Dangers - Java Malware Detection & Analysis.
Remcos Config - Using RC4 to Get Command & Control from CyberChef.
How to STEAL $1bn - A look at the Bangladesh Bank Heist.
Clubhouse Malware - Analysis of an Agent Tesla Infection Campaign.
JavaScript Malware - How bad can it be?.
Kaseya Ransomware Attack - 5 Key Insights into this Malware campaign.
NSO Pegasus Malware - How Governments spy on any phone.
Was it Really North Korea? Tools and Techniques to Attribute Malware Campaigns to Nation States.
Taught by
Colin Hardy
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network