2017-FOR610 Reverse-Engineering Malware: Malware Analysis Tools and Techniques

2017-FOR610Reverse-Engineering Malware: Malware Analysis Tools and Techniques
English | Size: 17.73 GB
Category: HACKING | Security


FOR-610-Malware Analysis Fundamentals.pdf
FOR-610-Reversing Malicious Code.pdf
FOR-610-Malicious Web and Document Files.pdf
FOR-610-InDepth Malware Analysis.pdf
FOR-610-Examining Self Defending Malware.pdf
FOR-610-WorkBook-.pdf [Read more…]

Pluralsight – Malware Analysis: Identifying and Defeating Packing

Pluralsight – Malware Analysis Identifying and Defeating Packing
English | Size: 363.28 MB
Category: Tutorial


Malware authors routinely utilize packing techniques to complicate the analysis of their code. This course will teach you techniques for identifying and defeating packing so that key characteristics and behaviors can be identified. [Read more…]

Linkedin – Learning Ethical Hacking The Complete Malware Analysis Process-RiDWARE

Linkedin – Learning Ethical Hacking The Complete Malware Analysis Process-RiDWARE
English | Size: 185.65 MB
Category: Tutorial


The key to effectively protecting your systems is understanding the attacks you have to defend them against. This course introduces the different types of malware (malicious software) that can be used to exploit a target computer. It covers viruses and worms malware which can propagate itself onto other computers through removable media or networks as well as Trojans and backdoors. Instructor Malcolm Shore explains where malware hides, and how you can detect it to protect your networks and systems against cyberattack He reverse-engineers malware so you can see how it operates, and explains how attackers create malware using automated malware construction kits called botnets. Along the way, Malcolm introduces malware analysis tools that are useful for the career of any IT professional [Read more…]

PluralSight – Malware Analysis Identifying and Defeating Code Obfuscation

PluralSight – Malware Analysis Identifying and Defeating Code Obfuscation
English | Size: 367.44 MB
Category: Tutorial


Malware authors will routinely utilize obfuscation techniques to complicate the analysis of their code. These techniques can prevent the discovery of important indicators of compromise and limit the ability to determine malware functionality. In this course, Malware Analysis: Identifying and Defeating Code Obfuscation, you will gain the skills necessary to not only identify prevalent obfuscation techniques but also how to effectively defeat them. First, you will see how obfuscation will affect your analysis and effective strategies for defeating a variety of obfuscation methods. Next, you will explore how to identify and detect obfuscation techniques in interpreted code. This includes software routinely abused by malware authors such as Powershell and Visual Basic for Applications. You will next be able to expand your skills by learning about code obfuscation in native code. Finally, you will discover how malware authors use cryptography for obfuscation and ways to detect it. Each module of this course will include detailed demonstrations and hands-on labs that will allow you to analyze real-world malware. You will be going deep into malware obfuscation techniques with such tools as IDA Pro and WinDbg. By the end of this course, you will have the knowledge and skills to effectively tackle obfuscation! [Read more…]

Udemy – The Complete Social Engineering, Phishing, OSINT & Malware

Udemy – The Complete Social Engineering, Phishing, OSINT & Malware
English | Size: 822.34 MB
Category: HACKING | Security


Requirements
A computer for installing all the free software and tools needed to practice
A strong work ethic, willingness to learn, and plenty of excitement about the back door of the digital world
Nothing else! It’s just you, your computer and your ambition to get started today
Description
Welcome to the “The Complete Social Engineering & Malware for Hacking Course” course.
Enroll and learn how to hack Windows, Mac OS X, Linux & Android by Using Social Engineering and how to secure yourself from hackers.
[Read more…]

PluralSight – Malware Analysis Identifying and Defeating Code Obfuscation

PluralSight – Malware Analysis Identifying and Defeating Code Obfuscation-BOOKWARE-KNiSO
English | Size: 248.49 MB
Category: Tutorial


Release Notes: Malware authors will routinely utilize obfuscation techniques to complicate the analysis of their code. These techniques can prevent the discovery of important indicators of compromise and limit the ability to determine malware functionality. In this course, Malware Analysis: Identifying and Defeating Code Obfuscation, you will gain the skills necessary to not only identify prevalent obfuscation techniques but also how to effectively defeat them. First, you will see how obfuscation will affect your analysis and effective strategies for defeating a variety of obfuscation methods. Next, you will explore how to identify and detect obfuscation techniques in interpreted code. This includes software routinely abused by malware authors such as Powershell and Visual Basic for Applications. You will next be able to expand your skills by learning about code obfuscation in native code. Finally, you will discover how malware authors use cryptography for obfuscation and ways to detect it. Each module of this course will include detailed demonstrations and hands-on labs that will allow you to analyze real-world malware. You will be going deep into malware obfuscation techniques with such tools as IDA Pro and WinDbg. By the end of this course, you will have the knowledge and skills to effectively tackle obfuscation! [Read more…]

INE-Advanced Malware Protection

INE-Advanced Malware Protection
English | Size: 384.58 MB
Category: Cisco | Networking | Security


This episode of the INE’s CCIE Security v5 Technology series focuses on Advanced Malware Protection (AMP) – an optional feature designed for continuous file monitoring, sandboxing and real-time malware blocking. By completing this course, you will know how to use and integrate AMP with web, email and firepower threat defense security appliances. [Read more…]

The Beginner Malware Analysis Course

The Beginner Malware Analysis Course
English | Size: 8.51 GB
Category: CBTs


The course contains a wide array of topics (in total 5+ hours of content), from recognizing Encryption Algorithms in Malware to Tips and Tricks I personally use for unpacking different malware samples on a daily basis. A full list of modules can be seen in the contents below, or in the video. After completing the course, you should be able to grab a recent sample of malware, unpack it, and begin to analyze it. Obviously learning from a course is one thing, but to become an expert in this field takes a lot of dedication, not to mention practice. Over the course of your journey to become an expert, you’ll learn many things, from how to create YARA rules, to writing Botnet trackers that many of you might have seen. Who knows, perhaps you will be the one to stop the next WannaCry. So, are you ready to take your first steps? [Read more…]

Advanced Malware Analysis

Advanced Malware Analysis
English | Size: 693.31 MB
Category: Tutorial


Publisher’s Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

A one-of-a-kind guide to setting up a malware research lab, using cutting-edge analysis tools, and reporting the findings
[Read more…]

Pluralsight – Malware Analysis – Identifying and Defeating Packing

Pluralsight – Malware Analysis – Identifying and Defeating Packing
English | Size: 363.28 MB
Category: Security

Malware authors routinely utilize packing techniques to complicate the analysis of their code. This course will teach you techniques for identifying and defeating packing so that key characteristics and behaviors can be identified. [Read more…]