Genre: eLearning | Language: English + .VTT | Duration: 2 hours | Size: 1.03 GB
What you'll learn
Reverse engineer malware
Spot malware using common windows API functions
Use static analysis techniques
Use dynamic analysis techniques
Create a simple keylogger in C
Requirements
Know how to use vmware or somthing similar
A little Windows API knowledge
A little IDA experience
A little Wireshark experience
A little programming knowledge
Description
Malware is everywhere and the industry is desperate for people who can track the hackers. In this course, you will learn about the various types and categories of malware, their symptoms, and how they work. As an incident responder, it is imperative that you understand the symptoms of malware, but more importantly that you are able to understand WHAT that malware is doing, and quickly.
In this course, you will learn how to perform the basics of dynamic malware analysis, a tried and true method of understanding what an unknown binary (malware) is doing on an infected system. You will build your own malware analysis virtual lab to create a safe analysis environment using FlareVM, and then we will perform the analysis on a real-world piece of malware to fully understand the concepts covered in this course.
So, if you have ever wondered how to better understand malware, this is the course for you!
Who this course is for:
Any one interested in malware
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.