YoVDO

Malware Analysis Knowledge

Offered By: YouTube

Tags

Malware Analysis Courses Cybersecurity Courses Reverse Engineering Courses Packer Courses

Course Description

Overview

Explore essential malware analysis techniques and tools in this comprehensive 1-hour 30-minute video series. Dive into topics such as Data Execution Prevention (DEP) with Ring Ø Labs, learn how to copy non-selectable window text for analysis, and understand the concept of packers and their usage with a UPX example. Discover the power of IDAPRO Python scripting for chain analysis, and gain insights into reverse engineering and debugging third-party Android APKs. Investigate easy file transfer methods in malware analysis and master the art of debugging and attaching to MIPS architecture using GDB-MULTIARCH. Enhance your cybersecurity skills and deepen your understanding of malware analysis through this informative video collection.

Syllabus

Ring Ø Labs - Story Time With DEP (Data Execution Prevention).
Malware Analysis Technique - Copy Non-Selectable Window Text.
Malware Analysis What Is A Packer and Why Are They Used? UPX Example.
IDAPRO Python Script Chains.
Reverse Engineering and Debugging 3rd Party Android APKs.
Malware Analysis - Easy File Transfer.
Debugging and Attaching to MIPS With GDB-MULTIARCH.


Taught by

Ring Zero Labs

Related Courses

Cyber Security Foundations: Common Malware Attacks and Defense Strategies
EC-Council via FutureLearn
Palo Alto Networks Cybersecurity Essentials II
Palo Alto Networks via Coursera
Digital Forensics and Incident Response (DFIR): An Introduction
PA Consulting via FutureLearn
CNIT 126: Practical Malware Analysis
CNIT - City College of San Francisco via Independent
MacOS Dylib Injection through Mach-O Binary Manipulation
Malware Unicorn via Independent