Malware Analyst Professional - Level 1
Buy now
Learn more
Course Syllabus
Malware Analyst Professional - Level 1 Syllabus.pdf
Malware Lab Samples
404 Not Found - Isn't that a Mystery?!
space1 - FlawedAmmyy.zip
Malicious Documents Lab Samples.zip
YARA Rules
sodinokibi.yara
PE.yara
WannaCry.yara
UPX.yara
Cryak.yara
Introduction and Lab Setup
Malware Analysis Lab OVA Deployment
1 - Introduction to Malware Analysis.mp4
2 - Lab Setup - Intro.mp4
3 - Lab Setup - Deploying Flare-VM.mp4
4 - Lab Setup - Connecting to INetSim.mp4
Introduction to Code Reverse Engineering
1 - Installing Visual Studio.mp4
2 - The four stages of Development.mp4
3 - Basic C Code Example - Part 1.mp4
4 - Basic C Code Example - Part 2.mp4
example1.c
example2.c
5 - Basic Reverse Engineering - Part 1.mp4
6 - Basic Reverse Engineering - Part 2.mp4
The PE Structure
1 - PE Structure Overview - Part 1.mp4
2 - PE Structure Overview - Part 2.mp4
3 - PE-exe vs. PE-dll.mp4
Static Malware Analysis
1 - Purpose and Goals of Malware Analysis.mp4
2 - Understanding Signature Names and VirusTotal Overview.mp4
3 - IoC vs. IoA.mp4
4 - Identifying File Types.mp4
5 - Calculating Hashes.mp4
6 - Strings Extraction.mp4
7 - Packing Analysis - Part 1.mp4
8 - Packing Analysis - Part 2.mp4
9 - Packing Analysis - Part 3.mp4
10 - Identifying Malicious Functionality.mp4
11 - Approaching and Reading Documentations.mp4
12 - Dissecting FlawedAmmyy - Part 1.mp4
13 - Dissecting FlawedAmmyy - Part 2.mp4
14 - Saving your RE progress to an IDB File.mp4
Dynamic Malware Analysis
1 - Introduction to Dynamic Analysis.mp4
2 - Working with Process Explorer.mp4
3 - Extracting IoCs using Process Hacker.mp4
4 - Working with Procmon.mp4
5 - Monitoring WinAPI Functions using API Logger.mp4
6 - Inspecting Process Command Line Parameters using CMD Watcher.mp4
7 - Debugging DLL Files with IDA Disassembler.mp4
8 - FlawedAmmyy RAT - Attack Flow PCAP Analysis Overview.mp4
9 - FlawedAmmyy RAT Dynamic Analysis .mp4
10 - FlawedAmmyy RAT Dynamic Reverse Engineering - Part 1.mp4
11 - FlawedAmmyy RAT Dynamic Reverse Engineering - Part 2.mp4
12 - Detecting FlawedAmmyy RAT with YARA.mp4
Malicious Documents Analysis
1 - Introduction to Malicious Documents.mp4
2 - Introduction to Analyzing Malicious PDF Files.mp4
3 - Analyzing the CVE-2008-2992 PDF Exploit.mp4
4 - Analyzing VBA Macros - Introduction.mp4
5 - Analyzing VBA Macros - Shellcode Injection.mp4
Products
Course
Section
Lesson
1 - Purpose and Goals of Malware Analysis.mp4
1 - Purpose and Goals of Malware Analysis.mp4
Malware Analyst Professional - Level 1
Buy now
Learn more
Course Syllabus
Malware Analyst Professional - Level 1 Syllabus.pdf
Malware Lab Samples
404 Not Found - Isn't that a Mystery?!
space1 - FlawedAmmyy.zip
Malicious Documents Lab Samples.zip
YARA Rules
sodinokibi.yara
PE.yara
WannaCry.yara
UPX.yara
Cryak.yara
Introduction and Lab Setup
Malware Analysis Lab OVA Deployment
1 - Introduction to Malware Analysis.mp4
2 - Lab Setup - Intro.mp4
3 - Lab Setup - Deploying Flare-VM.mp4
4 - Lab Setup - Connecting to INetSim.mp4
Introduction to Code Reverse Engineering
1 - Installing Visual Studio.mp4
2 - The four stages of Development.mp4
3 - Basic C Code Example - Part 1.mp4
4 - Basic C Code Example - Part 2.mp4
example1.c
example2.c
5 - Basic Reverse Engineering - Part 1.mp4
6 - Basic Reverse Engineering - Part 2.mp4
The PE Structure
1 - PE Structure Overview - Part 1.mp4
2 - PE Structure Overview - Part 2.mp4
3 - PE-exe vs. PE-dll.mp4
Static Malware Analysis
1 - Purpose and Goals of Malware Analysis.mp4
2 - Understanding Signature Names and VirusTotal Overview.mp4
3 - IoC vs. IoA.mp4
4 - Identifying File Types.mp4
5 - Calculating Hashes.mp4
6 - Strings Extraction.mp4
7 - Packing Analysis - Part 1.mp4
8 - Packing Analysis - Part 2.mp4
9 - Packing Analysis - Part 3.mp4
10 - Identifying Malicious Functionality.mp4
11 - Approaching and Reading Documentations.mp4
12 - Dissecting FlawedAmmyy - Part 1.mp4
13 - Dissecting FlawedAmmyy - Part 2.mp4
14 - Saving your RE progress to an IDB File.mp4
Dynamic Malware Analysis
1 - Introduction to Dynamic Analysis.mp4
2 - Working with Process Explorer.mp4
3 - Extracting IoCs using Process Hacker.mp4
4 - Working with Procmon.mp4
5 - Monitoring WinAPI Functions using API Logger.mp4
6 - Inspecting Process Command Line Parameters using CMD Watcher.mp4
7 - Debugging DLL Files with IDA Disassembler.mp4
8 - FlawedAmmyy RAT - Attack Flow PCAP Analysis Overview.mp4
9 - FlawedAmmyy RAT Dynamic Analysis .mp4
10 - FlawedAmmyy RAT Dynamic Reverse Engineering - Part 1.mp4
11 - FlawedAmmyy RAT Dynamic Reverse Engineering - Part 2.mp4
12 - Detecting FlawedAmmyy RAT with YARA.mp4
Malicious Documents Analysis
1 - Introduction to Malicious Documents.mp4
2 - Introduction to Analyzing Malicious PDF Files.mp4
3 - Analyzing the CVE-2008-2992 PDF Exploit.mp4
4 - Analyzing VBA Macros - Introduction.mp4
5 - Analyzing VBA Macros - Shellcode Injection.mp4
Lesson unavailable
Please
login to your account
or
buy the course
.