Malware Analysis Course for IT security

Malware Analysis Course for IT security
English | Size: 466.68 MB
Category: CBTs

Malware Analysis for IT Security lays the Groundwork for the course by presenting the key tools and
techniques malware analyst use to examine malicious programs. You will learn how to
save time by Exploring malware in two phases. Behavioral analysis focuses on the Specimen’s interaction
with its Environment such as Registry, Network, the File system
Code Analysis focuses on the specimen’s code and make use of a disassembler and a debugger. You will learn
how to build a Secure Laboratory to perform such analysis in a controlled manner [Read more…]

SANS FOR610 Reverse-Engineering Malware Malware Analysis Tools and Techniques Includes Everything (2016)

SANS FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques | Includes Everything (2016)
English | Size: 14.04 GB
Category: CBTs

Includes

PDFs (searchable)
Audio
USB
Cheat sheet

Course Syllabus
FOR610.1: Malware Analysis Fundamentals
FOR610.2: Reversing Malicious Code
FOR610.3: Malicious Web and Document Files
FOR610.4: In-Depth Malware Analysis
FOR610.5: Examining Self-Defending Malware
FOR610.6: Malware Analysis Tournament [Read more…]

SANS SEC 569 Combating Malware in the Enterprise On-Demand Videos

SANS SEC 569 Combating Malware in the Enterprise On-Demand Videos
English | Size: 3.01 GB
Category: Tutorial

Lenny Zeltser’s SANS Security 569: Combating Malware in the Enterprise is an excellent course to help you devise a robust malware incident response plan. It is a 2-day, in-depth course that extensively covers malware. [Read more…]

Performing Malware Analysis on Malicious Documents

Performing Malware Analysis on Malicious Documents
English | Size: 460.24 MB
Category: CBTs

Malicious documents have become a form of malware that all incident responders need to be able to analyze. This course will teach you how to analyze malicious Adobe PDF and Microsoft Office documents, along with any malicious scripts they contain. [Read more…]

Fundamentals of Malware Analysis

Fundamentals of Malware Analysis
English | Size: 359.95 MB
Category: Tutorial

In this video course, we start with the basic concepts of malware and you’ll get familiar with the different types of malware and the malware analysis process. Before moving on with the techniques of malware analysis, you’ll see how to set up your own lab to make a secure environment for malware analysis. [Read more…]

INE | Ethical Hacking: Module 6 :: Malware Threats | Josue Vargas

INE | Ethical Hacking: Module 6 :: Malware Threats | Josue Vargas
English | Size: 387.04 MB
Category: CBTS

In this module you will learn how malware works, the different categories of malware and how to use it to your advantage. Encompassing a lot of different tools, malware refers to software used for malicious purposes and currently, threats related to malware are causing millions of dollars in damage, data and reputation loss worldwide. As an ethical hacker, you’re expected to know how to use malware offensively, but also recognize symptoms and signals that point to malware infections; in this module you will build and use malware to infect computers and you will also learn how to detect its presence in a system. Enjoy! [Read more…]

Lynda Wireshark Malware and Forensics

Lynda Wireshark Malware and Forensics
English | Size: 304.75 MB
Category: Tutorial

Wireshark: Malware and Forensics / Description
Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic. [Read more…]

Lynda – Wireshark: Malware and Forensics


Lynda – Wireshark: Malware and Forensics[/b]
English | Size: 279.2 MB
Genre: eLearning

[Read more…]

Lynda – Malware – Defense and Response

Lynda – Malware – Defense and Response
English | Size: 90.58 MB
Category: CBTs

Malware: Defense and Response

As a network administrator, encountering malware within your enterprise is nearly inevitable. In this course, Scott Burrell covers the steps necessary to recover from a malware attack on your network, and discusses tactics to avoid its spread or return. Scott highlights different types of malware threats, and provides strategies for isolating malware to protect clean systems. He also reviews best practices for implementing antimalware protection for enterprise networks, Windows update strategies, and important elements of a user education program to help provide you with a solid defense against future attacks. [Read more…]

Lynda – Windows Performance Toolkit – Malware Analysis

Lynda – Windows Performance Toolkit – Malware Analysis
English | Size: 774.92 MB
Category: Tutorial

Each time you go online, you face the threat of malware. In this course, learn how to find and analyze malware that’s undetected by most antivirus programs. Follow Thomas Pantels as he shows how to work with the Windows Performance Recorder-which is used to record system events-and the Windows Performance Analyzer, which is used to inspect those events. He explains how to find and analyze key logger patterns and then shows how to analyze screen recordings, webcam recordings, and microphone recordings.
[Read more…]