Register Account


Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Malware Analysis For Absolute Begginers
#1
[Image: 9027ea684b62dc6423dc4781ef9f3ded.jpg]
Malware Analysis For Absolute Begginers
Published 5/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.94 GB | Duration: 6h 1m

Practice Malware Analysis

What you'll learn

Understand the fundamental of Malware.

Master Malware Concepts and Techniques

Practice Statice Malware Analysis

Practice Dynamic Malware Analysis

Build Malware Analysis Lab

Master Malware analysis tools

Analysis Real life Scenarios

Requirements

No Requiements or Prerequists this course for Absolute Begginers

Description

This course is designed to provide an in-depth understanding of malware and its analysis. Students will learn the fundamentals of malware, types of malware, commodity vs APT malware, and the methodologies used to analyze it. The course will cover topics such as the introduction to Operating system and operating system functions and libraries, memory management, static and dynamic malware analysis.Students will learn how to build malware using various programming languages, and analyze it using different tools and techniques. The course will also cover malware analysis in a virtual environment, including setting up a malware analysis lab using virtual platforms and a variety of other software and tools.The course is structured to provide hands-on experience in analyzing malware. Students will gain practical experience in reverse engineering, behavior analysis, and system forensics. By the end of the course, students will be able to identify various types of malware and understand the mechanisms used by malware to evade detection.Learning Outcomes:Upon completion of the course, students will be able to:Understand the fundamentals of malware and its different typesDistinguish between commodity and APT malwareBuild malware using various programming languagesConduct static and dynamic malware analysisSet up a malware analysis lab using virtual platforms and various software toolsAnalyze the behavior of malware to understand its capabilities and potential impact on the systemUnderstand the functions of operating systems and operating system librariesConduct memory forensics to identify malware activity in memoryApply malware analysis techniques to identify and analyze advanced malware.

Overview

Section 1: Introduction

Lecture 1 Introduction

Lecture 2 Introduction to Malware Analysis

Lecture 3 Resources

Section 2: Introduction to Malware

Lecture 4 What is Malware?

Lecture 5 Malware Distribution

Lecture 6 Commidity Vs. APT Malware

Lecture 7 Types of Malware

Lecture 8 Building Malware

Section 3: Introduction to Operating System and Memory

Lecture 9 Introduction to Operating System Part 1

Lecture 10 Introduction to Operating System Part 2

Lecture 11 Operating System Functions and Libraries Part 1

Lecture 12 Operating System Functions and Libraries part 2

Lecture 13 Introduction to main memory

Section 4: Techniques Used in Malware

Lecture 14 Reverse Binary

Lecture 15 Obfuscation and Paking Software

Section 5: Malware Analysis Lab

Lecture 16 Download and Install Vmware

Lecture 17 Download and Install VirtualBox

Lecture 18 Download and Install Kali Linux

Lecture 19 Download and Install Windows 11 VM Part 1

Lecture 20 Download and Install Windows 11 VM part 2

Lecture 21 Download and Install HashCalc

Lecture 22 Download and Install Exeifo

Lecture 23 Download and Install UPX

Lecture 24 Download and Install PEstudio

Lecture 25 Download and Install Hxd

Lecture 26 Download and Install Bitext

Lecture 27 Download and Install Process Monitor

Lecture 28 Finalize your lab

Section 6: Linux commands Essentials

Lecture 29 Navigating File System

Lecture 30 Users and Priviledges-1

Lecture 31 Users and Priviledges-2

Lecture 32 Networking Commands

Lecture 33 Installing and Updating Tools

Lecture 34 Controlling Kali Linux Services

Lecture 35 Viewing, Creating and Editing Files

Lecture 36 grep Commands part 1

Lecture 37 grep Commands part 2

Lecture 38 More Linux Commands

Section 7: Introduction to PE Format

Lecture 39 Introduction to PE Format

Section 8: Start Malware Analysis

Lecture 40 What is Malware Analysis

Lecture 41 Static Malware Analysis

Lecture 42 Dynamic Malware Analysis

Lecture 43 Static Malware Analysis Phases

Section 9: Practice Malware Analysis

Lecture 44 Static Analysis- Submit the Hash of Malware

Lecture 45 Static Analysis-Identifying the file type

Lecture 46 Static Analysis- Extracting Strings

Lecture 47 Static Analysis- Analyse the PE file

Lecture 48 Static Analysis another Scenario

Lecture 49 Practice Dynamic Analysis-1

Lecture 50 Practice Daynamic Analysis-2

Section 10: Practice Malware analysis in Kali Linux

Lecture 51 Practice Malware Analysis in Kali Linux

Anyone wants to Master Malware Analysis in Practical Method

[Image: Y9Unafgo_o.jpg]

TurboBit

[To see links please register or login]

RapidGator

[To see links please register or login]

AlfaFile

[To see links please register or login]

[Image: signature.png]
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

Download Now   Download Now
Download Now   Download Now


Telegram