8 hours ago
Malware Analysis For Absolute Begginers
Published 5/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.94 GB | Duration: 6h 1m
Practice Malware Analysis
What you'll learn
Understand the fundamental of Malware.
Master Malware Concepts and Techniques
Practice Statice Malware Analysis
Practice Dynamic Malware Analysis
Build Malware Analysis Lab
Master Malware analysis tools
Analysis Real life Scenarios
Requirements
No Requiements or Prerequists this course for Absolute Begginers
Description
This course is designed to provide an in-depth understanding of malware and its analysis. Students will learn the fundamentals of malware, types of malware, commodity vs APT malware, and the methodologies used to analyze it. The course will cover topics such as the introduction to Operating system and operating system functions and libraries, memory management, static and dynamic malware analysis.Students will learn how to build malware using various programming languages, and analyze it using different tools and techniques. The course will also cover malware analysis in a virtual environment, including setting up a malware analysis lab using virtual platforms and a variety of other software and tools.The course is structured to provide hands-on experience in analyzing malware. Students will gain practical experience in reverse engineering, behavior analysis, and system forensics. By the end of the course, students will be able to identify various types of malware and understand the mechanisms used by malware to evade detection.Learning Outcomes:Upon completion of the course, students will be able to:Understand the fundamentals of malware and its different typesDistinguish between commodity and APT malwareBuild malware using various programming languagesConduct static and dynamic malware analysisSet up a malware analysis lab using virtual platforms and various software toolsAnalyze the behavior of malware to understand its capabilities and potential impact on the systemUnderstand the functions of operating systems and operating system librariesConduct memory forensics to identify malware activity in memoryApply malware analysis techniques to identify and analyze advanced malware.
Overview
Section 1: Introduction
Lecture 1 Introduction
Lecture 2 Introduction to Malware Analysis
Lecture 3 Resources
Section 2: Introduction to Malware
Lecture 4 What is Malware?
Lecture 5 Malware Distribution
Lecture 6 Commidity Vs. APT Malware
Lecture 7 Types of Malware
Lecture 8 Building Malware
Section 3: Introduction to Operating System and Memory
Lecture 9 Introduction to Operating System Part 1
Lecture 10 Introduction to Operating System Part 2
Lecture 11 Operating System Functions and Libraries Part 1
Lecture 12 Operating System Functions and Libraries part 2
Lecture 13 Introduction to main memory
Section 4: Techniques Used in Malware
Lecture 14 Reverse Binary
Lecture 15 Obfuscation and Paking Software
Section 5: Malware Analysis Lab
Lecture 16 Download and Install Vmware
Lecture 17 Download and Install VirtualBox
Lecture 18 Download and Install Kali Linux
Lecture 19 Download and Install Windows 11 VM Part 1
Lecture 20 Download and Install Windows 11 VM part 2
Lecture 21 Download and Install HashCalc
Lecture 22 Download and Install Exeifo
Lecture 23 Download and Install UPX
Lecture 24 Download and Install PEstudio
Lecture 25 Download and Install Hxd
Lecture 26 Download and Install Bitext
Lecture 27 Download and Install Process Monitor
Lecture 28 Finalize your lab
Section 6: Linux commands Essentials
Lecture 29 Navigating File System
Lecture 30 Users and Priviledges-1
Lecture 31 Users and Priviledges-2
Lecture 32 Networking Commands
Lecture 33 Installing and Updating Tools
Lecture 34 Controlling Kali Linux Services
Lecture 35 Viewing, Creating and Editing Files
Lecture 36 grep Commands part 1
Lecture 37 grep Commands part 2
Lecture 38 More Linux Commands
Section 7: Introduction to PE Format
Lecture 39 Introduction to PE Format
Section 8: Start Malware Analysis
Lecture 40 What is Malware Analysis
Lecture 41 Static Malware Analysis
Lecture 42 Dynamic Malware Analysis
Lecture 43 Static Malware Analysis Phases
Section 9: Practice Malware Analysis
Lecture 44 Static Analysis- Submit the Hash of Malware
Lecture 45 Static Analysis-Identifying the file type
Lecture 46 Static Analysis- Extracting Strings
Lecture 47 Static Analysis- Analyse the PE file
Lecture 48 Static Analysis another Scenario
Lecture 49 Practice Dynamic Analysis-1
Lecture 50 Practice Daynamic Analysis-2
Section 10: Practice Malware analysis in Kali Linux
Lecture 51 Practice Malware Analysis in Kali Linux
Anyone wants to Master Malware Analysis in Practical Method