INE-Advanced Malware Protection

INE-Advanced Malware Protection
English | Size: 384.58 MB
Category: Cisco | Networking | Security


This episode of the INE’s CCIE Security v5 Technology series focuses on Advanced Malware Protection (AMP) – an optional feature designed for continuous file monitoring, sandboxing and real-time malware blocking. By completing this course, you will know how to use and integrate AMP with web, email and firepower threat defense security appliances. [Read more…]

The Beginner Malware Analysis Course

The Beginner Malware Analysis Course
English | Size: 8.51 GB
Category: CBTs


The course contains a wide array of topics (in total 5+ hours of content), from recognizing Encryption Algorithms in Malware to Tips and Tricks I personally use for unpacking different malware samples on a daily basis. A full list of modules can be seen in the contents below, or in the video. After completing the course, you should be able to grab a recent sample of malware, unpack it, and begin to analyze it. Obviously learning from a course is one thing, but to become an expert in this field takes a lot of dedication, not to mention practice. Over the course of your journey to become an expert, you’ll learn many things, from how to create YARA rules, to writing Botnet trackers that many of you might have seen. Who knows, perhaps you will be the one to stop the next WannaCry. So, are you ready to take your first steps? [Read more…]

Advanced Malware Analysis

Advanced Malware Analysis
English | Size: 693.31 MB
Category: Tutorial


Publisher’s Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

A one-of-a-kind guide to setting up a malware research lab, using cutting-edge analysis tools, and reporting the findings
[Read more…]

Pluralsight – Malware Analysis – Identifying and Defeating Packing

Pluralsight – Malware Analysis – Identifying and Defeating Packing
English | Size: 363.28 MB
Category: Security

Malware authors routinely utilize packing techniques to complicate the analysis of their code. This course will teach you techniques for identifying and defeating packing so that key characteristics and behaviors can be identified. [Read more…]

PLURALSIGHT MALWARE ANALYSIS IDENTIFYING AND DEFEATING PACKING

PLURALSIGHT MALWARE ANALYSIS IDENTIFYING AND DEFEATING PACKING
English | Size: 366.93 MB
Category: Tutorial

Malware authors will routinely utilize obfuscation techniques to complicate the analysis of their code. One such technique is packing, in which a malicious program is layered inside another program. In Malware Analysis: Identifying and Defeating Packing, you will gain the skills necessary to not only identify prevalent packing techniques, but also how to effectively defeat them. First, you will learn how packers work and how malware authors regularly use them. Next, you will learn how to detect common packers and methods for unpacking. Finally, you will learn about custom packers, how you can identify them and effective ways for defeating them. Each module of this course will include detailed demonstrations and hands-on labs that will allow you to analyze real-world malware. You will be going deep into malware packing techniques with such tools as IDA Pro and WinDbg, by the end of this course you will have the
knowledge and skills to effectively tackle packing! [Read more…]

Packt – Advanced Malware Analysis

Packt – Advanced Malware Analysis
English | Size: 658.80 MB
Category: Tutorial

In this video course, we cover advanced malware analysis topics. Towards this goal, we first understand the behavior of different classes of malware. Such knowledge helps us to easily categorize malware based on its characteristic. We see how sophisticated malware can use techniques to either evade detection or increase its damage and access to the system.
[Read more…]

Pluralsight – Getting Started Analyzing Malware Infections

Getting Started Analyzing Malware Infections
English | Size: 248.81 MB
Category: Tutorial

Computer virus outbreaks are becoming more complex and use clever deployment tactics that trick people into getting infected, even without their knowledge. Traditional antivirus technologies have a hard time keeping up. There is a need for security analysts that are able to tackle these infections and stop them from infecting other computers. In this course, Getting Started Analyzing Malware Infections, you’ll learn how to safely contain and analyze suspicious files and URLs. Next, you learn to extract malicious scripts from documents, deobfuscate them, and extract indicators that lead to other malware components. Finally, you will learn to investigate virus deployment techniques that bypass modern security controls. When you’re finished with this course, you will have the skills and the knowledge to build layered defenses that will disrupt the infection chain at multiple stages protecting your data and your company. [Read more…]

PLURALSIGHT HUNTING FOR FILELESS MALWARE

PLURALSIGHT HUNTING FOR FILELESS MALWARE
English | Size: 841.38 MB
Category: Tutorial

In this course, Hunting for Fileless Malware, Tyler Hudak and Aaron Rosenmund tackle what exactly fileless malware is why it is used by attackers, and the different defensive strategies that can be taken to defend your organizations
from it. Learn about different examples of fileless malware techniques, the use of native tools (PowerShell and WMI)
and the types of defenses you can use. By the end of this course, you ll have a solid understanding of the various types of fileless malware and how best to defend against it [Read more…]

Hunting for Fileless Malware

Hunting for Fileless Malware
English | Size: 833.05 MB
Category: HACKING | Networking | Security

In this course, Hunting for Fileless Malware, Tyler Hudak and Aaron Rosenmund tackle what exactly fileless malware is, why it is used by attackers, and the different defensive strategies that can be taken to defend your organizations from it. Learn about different examples of fileless malware techniques, the use of native tools (PowerShell and WMI), and the types of defenses you can use. By the end of this course, you’ll have a solid understanding of the various types of fileless malware and how best to defend against it. [Read more…]

Malware Analysis Course for IT security

Malware Analysis Course for IT security
English | Size: 466.68 MB
Category: CBTs

Malware Analysis for IT Security lays the Groundwork for the course by presenting the key tools and
techniques malware analyst use to examine malicious programs. You will learn how to
save time by Exploring malware in two phases. Behavioral analysis focuses on the Specimen’s interaction
with its Environment such as Registry, Network, the File system
Code Analysis focuses on the specimen’s code and make use of a disassembler and a debugger. You will learn
how to build a Secure Laboratory to perform such analysis in a controlled manner [Read more…]

Skip to toolbar