INE | Ethical Hacking: Module 6 :: Malware Threats | Josue Vargas

INE | Ethical Hacking: Module 6 :: Malware Threats | Josue Vargas
English | Size: 387.04 MB
Category: CBTS

In this module you will learn how malware works, the different categories of malware and how to use it to your advantage. Encompassing a lot of different tools, malware refers to software used for malicious purposes and currently, threats related to malware are causing millions of dollars in damage, data and reputation loss worldwide. As an ethical hacker, you’re expected to know how to use malware offensively, but also recognize symptoms and signals that point to malware infections; in this module you will build and use malware to infect computers and you will also learn how to detect its presence in a system. Enjoy! [Read more…]

Lynda Wireshark Malware and Forensics

Lynda Wireshark Malware and Forensics
English | Size: 304.75 MB
Category: Tutorial

Wireshark: Malware and Forensics / Description
Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic. [Read more…]

Lynda – Wireshark: Malware and Forensics


Lynda – Wireshark: Malware and Forensics[/b]
English | Size: 279.2 MB
Genre: eLearning

[Read more…]

Lynda – Malware – Defense and Response

Lynda – Malware – Defense and Response
English | Size: 90.58 MB
Category: CBTs

Malware: Defense and Response

As a network administrator, encountering malware within your enterprise is nearly inevitable. In this course, Scott Burrell covers the steps necessary to recover from a malware attack on your network, and discusses tactics to avoid its spread or return. Scott highlights different types of malware threats, and provides strategies for isolating malware to protect clean systems. He also reviews best practices for implementing antimalware protection for enterprise networks, Windows update strategies, and important elements of a user education program to help provide you with a solid defense against future attacks. [Read more…]

Lynda – Windows Performance Toolkit – Malware Analysis

Lynda – Windows Performance Toolkit – Malware Analysis
English | Size: 774.92 MB
Category: Tutorial

Each time you go online, you face the threat of malware. In this course, learn how to find and analyze malware that’s undetected by most antivirus programs. Follow Thomas Pantels as he shows how to work with the Windows Performance Recorder-which is used to record system events-and the Windows Performance Analyzer, which is used to inspect those events. He explains how to find and analyze key logger patterns and then shows how to analyze screen recordings, webcam recordings, and microphone recordings.
[Read more…]

Pluralsight – Malware Analysis Fundamentals

Pluralsight – Malware Analysis Fundamentals
English | Size: 658.94 MB
Category: Tutorial

The ability to analyze malware has become a necessary skill for anyone performing incident response. This course will teach the skills required to properly, quickly, and safely analyze malware by examining both its characteristics and behavior.
Since finding malware is a common occurrence for anyone that performs incident response, knowing how to properly analyze that malware is an essential skill. In this course, Malware Analysis Fundamentals, you’ll gain the ability to analyze malware. First, you’ll explore how to keep yourself and your systems safe when analyzing malware. Next, you’ll discover how to get information on the malware by examining its characteristics. [Read more…]

Pluralsight – Advanced Malware Analysis – Combating Exploit Kits

Pluralsight – Advanced Malware Analysis – Combating Exploit Kits
English | Size: 662.34 MB
Category: Tutorial

Course Overview 1m 19s
Introduction
16m 15s
Introduction to Malware 1m 32s
Demo: Analyzing a Bromium Alert 8m 10s
Security Tool Follow-up 5m 46s
First Malware Analysis Lab 0m 45s
Recognizing the Exploit Vector
15m 19s
[Read more…]

SANS FOR610 Reverse Engineering Malware

SANS FOR610 Reverse Engineering Malware
English | Size: 6.43 GB
Category: Tutorial

This malware analysis course prepares forensic investigators, incident responders, and malware specialists to reverse-engineer malicious software using practical tools and techniques.

This popular malware analysis course has helped forensic investigators, malware specialists, incident responders, and IT administrators assess malware threats. The course teaches a practical approach to examining malicious programs-spyware, bots, trojans, etc.-that target or run on Microsoft Windows. This training also looks at reversing Web-based malware, such as javascript and Flash files, as well as malicious document files. By the end of the course, you’ll learn how to reverse-engineer malicious software using a variety of system and network monitoring utilities, a disassembler, a debugger, and other tools for turning malware inside-out!
[Read more…]

Pluralsight – Malware Analysis -The Big Picture

Pluralsight – Malware Analysis -The Big Picture
English | Size: 264.98 MB
Category: Tutorial

Whether you are a board member or front line supervisor, you need to understand the threat malware poses to your company. This course teaches you what malware is, how it infects your systems, and the teams and tools required to minimize the impact.
Every day a new breach occurs at companies large and small. Some impact tens of millions of customers, destroy a company’s reputation, consumer trust, or investor confidence. Some breaches go unnoticed for months or years and quietly leak sensitive information, company secrets, customer data, and more. In this course, Malware Analysis: The Big Picture, you will learn the basics of what malware is, and how it gets into your networks and infects your systems. First, you will delve into what skills, tools, and teams you’ll need in place to effectively combat these breaches. [Read more…]

SANS FOR610 Reverse Engineering Malware

SANS FOR610 Reverse Engineering Malware
English | Size: 6.43 GB
Category: Video Training


This malware analysis course prepares forensic investigators, incident responders, and malware specialists to reverse-engineer malicious software using practical tools and techniques.
[Read more…]