Pluralsight – Getting Started Analyzing Malware Infections

Getting Started Analyzing Malware Infections
English | Size: 248.81 MB
Category: Tutorial

Computer virus outbreaks are becoming more complex and use clever deployment tactics that trick people into getting infected, even without their knowledge. Traditional antivirus technologies have a hard time keeping up. There is a need for security analysts that are able to tackle these infections and stop them from infecting other computers. In this course, Getting Started Analyzing Malware Infections, you’ll learn how to safely contain and analyze suspicious files and URLs. Next, you learn to extract malicious scripts from documents, deobfuscate them, and extract indicators that lead to other malware components. Finally, you will learn to investigate virus deployment techniques that bypass modern security controls. When you’re finished with this course, you will have the skills and the knowledge to build layered defenses that will disrupt the infection chain at multiple stages protecting your data and your company. [Read more…]

PLURALSIGHT HUNTING FOR FILELESS MALWARE

PLURALSIGHT HUNTING FOR FILELESS MALWARE
English | Size: 841.38 MB
Category: Tutorial

In this course, Hunting for Fileless Malware, Tyler Hudak and Aaron Rosenmund tackle what exactly fileless malware is why it is used by attackers, and the different defensive strategies that can be taken to defend your organizations
from it. Learn about different examples of fileless malware techniques, the use of native tools (PowerShell and WMI)
and the types of defenses you can use. By the end of this course, you ll have a solid understanding of the various types of fileless malware and how best to defend against it [Read more…]

Hunting for Fileless Malware

Hunting for Fileless Malware
English | Size: 833.05 MB
Category: HACKING | Networking | Security

In this course, Hunting for Fileless Malware, Tyler Hudak and Aaron Rosenmund tackle what exactly fileless malware is, why it is used by attackers, and the different defensive strategies that can be taken to defend your organizations from it. Learn about different examples of fileless malware techniques, the use of native tools (PowerShell and WMI), and the types of defenses you can use. By the end of this course, you’ll have a solid understanding of the various types of fileless malware and how best to defend against it. [Read more…]

Malware Analysis Course for IT security

Malware Analysis Course for IT security
English | Size: 466.68 MB
Category: CBTs

Malware Analysis for IT Security lays the Groundwork for the course by presenting the key tools and
techniques malware analyst use to examine malicious programs. You will learn how to
save time by Exploring malware in two phases. Behavioral analysis focuses on the Specimen’s interaction
with its Environment such as Registry, Network, the File system
Code Analysis focuses on the specimen’s code and make use of a disassembler and a debugger. You will learn
how to build a Secure Laboratory to perform such analysis in a controlled manner [Read more…]

SANS FOR610 Reverse-Engineering Malware Malware Analysis Tools and Techniques Includes Everything (2016)

SANS FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques | Includes Everything (2016)
English | Size: 14.04 GB
Category: CBTs

Includes

PDFs (searchable)
Audio
USB
Cheat sheet

Course Syllabus
FOR610.1: Malware Analysis Fundamentals
FOR610.2: Reversing Malicious Code
FOR610.3: Malicious Web and Document Files
FOR610.4: In-Depth Malware Analysis
FOR610.5: Examining Self-Defending Malware
FOR610.6: Malware Analysis Tournament [Read more…]

SANS SEC 569 Combating Malware in the Enterprise On-Demand Videos

SANS SEC 569 Combating Malware in the Enterprise On-Demand Videos
English | Size: 3.01 GB
Category: Tutorial

Lenny Zeltser’s SANS Security 569: Combating Malware in the Enterprise is an excellent course to help you devise a robust malware incident response plan. It is a 2-day, in-depth course that extensively covers malware. [Read more…]

Performing Malware Analysis on Malicious Documents

Performing Malware Analysis on Malicious Documents
English | Size: 460.24 MB
Category: CBTs

Malicious documents have become a form of malware that all incident responders need to be able to analyze. This course will teach you how to analyze malicious Adobe PDF and Microsoft Office documents, along with any malicious scripts they contain. [Read more…]

Fundamentals of Malware Analysis

Fundamentals of Malware Analysis
English | Size: 359.95 MB
Category: Tutorial

In this video course, we start with the basic concepts of malware and you’ll get familiar with the different types of malware and the malware analysis process. Before moving on with the techniques of malware analysis, you’ll see how to set up your own lab to make a secure environment for malware analysis. [Read more…]

INE | Ethical Hacking: Module 6 :: Malware Threats | Josue Vargas

INE | Ethical Hacking: Module 6 :: Malware Threats | Josue Vargas
English | Size: 387.04 MB
Category: CBTS

In this module you will learn how malware works, the different categories of malware and how to use it to your advantage. Encompassing a lot of different tools, malware refers to software used for malicious purposes and currently, threats related to malware are causing millions of dollars in damage, data and reputation loss worldwide. As an ethical hacker, you’re expected to know how to use malware offensively, but also recognize symptoms and signals that point to malware infections; in this module you will build and use malware to infect computers and you will also learn how to detect its presence in a system. Enjoy! [Read more…]

Lynda Wireshark Malware and Forensics

Lynda Wireshark Malware and Forensics
English | Size: 304.75 MB
Category: Tutorial

Wireshark: Malware and Forensics / Description
Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic. [Read more…]

Skip to toolbar