logo

Part 13 - Malware Analysis I

Part 13 - Malware Analysis I
Course content
Introduction to Malware Analysis
Module Introduction
Week 13 - Kickoff
Introduction to Cyber Attacks
Cyber Attacks Statistics
The Evolution of Malware Detection and Analysis
Noteworthy Malware Outbreaks
Understanding the Spread of Cyber Threats
Malware Propagation
The Invisible Threat
Fileless Malware Attack
Microsoft PowerShell
Malware Detection and Analysis
Stages of Malware Analysis
Static vs. Dynamic Analysis
Malware Analysis Approaches
Safe Malware Analysis
Analyze Without Compromise
Introduction to Malware Analysis - Knowledge Check
Incident Response Stages
Introduction to Incident Response Stages
Preparation Stage
Containment, Eradication, and Recovery Stage
Post-Incident Activity Stage
Detection and Analysis
HashCalc - Tool Introduction
HashCompare - Tool Introduction
FileAlyzer - Tool Introduction
PDFStreamDumper - Tool Introduction
Malware Obfuscation
Exeinfo PE - Tool Introduction
Ready, Set, Lab! - Malware Analysis Using SysInternals
Week 13 - Malware Analysis Using SysInternals
2Questions
Week 13 - Malware Analysis Using SysInternals
Ready, Set, Lab! - Malware Investigation
Week 13 - Malware Investigation
2Questions
UPX Easy GUI - Tool Introduction
Ghidra - Tool Introduction
Ready, Set, Lab! - Analyze the Malware
Week 13 - Analyze the Malware
2Questions
Incident Response Stages - knowledge check
Static Analysis
Static Detection and Analysis
Portable Executable File
Reverse Engineering
PeStudio
YARA Rules
Addtional Static Analysis Tools
Module Closure
Week 13 - Weekly Quiz
10Questions
Week 13 - Key Takeaways
Your Career Guide to Success
Your Social Media Footprint

ThriveDX