Introduction to Malware Analysis
Introduction to Cyber Attacks
The Evolution of Malware Detection and Analysis
Noteworthy Malware Outbreaks
Understanding the Spread of Cyber Threats
Malware Detection and Analysis
Stages of Malware Analysis
Static vs. Dynamic Analysis
Malware Analysis Approaches
Analyze Without Compromise
Introduction to Malware Analysis - Knowledge Check
Incident Response Stages
Introduction to Incident Response Stages
Containment, Eradication, and Recovery Stage
Post-Incident Activity Stage
HashCalc - Tool Introduction
HashCompare - Tool Introduction
FileAlyzer - Tool Introduction
PDFStreamDumper - Tool Introduction
Exeinfo PE - Tool Introduction
Ready, Set, Lab! - Malware Analysis Using SysInternals
Week 13 - Malware Analysis Using SysInternals
Ready, Set, Lab! - Malware Investigation
UPX Easy GUI - Tool Introduction
Ghidra - Tool Introduction
Ready, Set, Lab! - Analyze the Malware
Incident Response Stages - knowledge check
Static Analysis
Static Detection and Analysis
Addtional Static Analysis Tools
Module Closure
Week 13 - Weekly Quiz (Master)
10Questions
Your Career Guide to Success
Your Social Media Footprint