YoVDO

Malware Analysis

Offered By: YouTube

Tags

Malware Analysis Courses Java Courses .NET Courses Reverse Engineering Courses IDA Pro Courses Memory Allocation Courses Botnets Courses

Course Description

Overview

Dive into the world of malware analysis and reverse engineering through this comprehensive 1.5-hour tutorial. Learn to troubleshoot Procdot installation issues, analyze malicious documents, and reverse engineer .NET and Java applications. Master debugging and patching techniques using IDA Pro Free, and explore the fundamentals of building Remote Access Tools (RATs) in C#. Discover advanced topics such as desktop capture, keyloggers, and botnet design. Gain practical skills in tracing memory allocations, solving virtual machine connectivity issues, and tackling shared folder access problems on Linux systems.

Syllabus

Procdot: How to solve Dot executable is not properly installed error.
Malware Analysis of Malicious Documents.
Reverse Engineering and Malware Analysis of .NET and Java.
How to Debug and Patch using IDA Pro Free.
Reverse Engineering : IDA Pro For Beginners.
Unable to Open Shared Folder on Linux - Solution.
Reverse Engineering and Malware Analysis - Intermediate Level.
Fundamentals of Building a Remote Access Tool (RAT) in C#.
Remote Access Tool 2 (RAT2) : Desktop Capture and Keyloggers.
Tracing Memory Allocations with VirtualAlloc, VirtualAllocEx and NtAllocateVirtualMemory.
How to solve internet connectivity problems with oracle virtual machines.
Remote Access Tools (RAT3) : Design and Implement Botnets.


Taught by

Paul Chin

Related Courses

Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Palo Alto Networks Cybersecurity Essentials II
Palo Alto Networks via Coursera
Introducción al Análisis del Malware en Windows
National Technological University – Buenos Aires Regional Faculty via Miríadax
Android Malware Analysis - From Zero to Hero
Udemy
How to Create and Embed Malware (2-in-1 Course)
Udemy