Malware Analysis For Absolute Begginers - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: Malware Analysis For Absolute Begginers (/Thread-Malware-Analysis-For-Absolute-Begginers) |
Malware Analysis For Absolute Begginers - AD-TEAM - 02-04-2025 Malware Analysis For Absolute Begginers Published 5/2023 MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz Language: English | Size: 2.94 GB | Duration: 6h 1m Practice Malware Analysis What you'll learn Understand the fundamental of Malware. Master Malware Concepts and Techniques Practice Statice Malware Analysis Practice Dynamic Malware Analysis Build Malware Analysis Lab Master Malware analysis tools Analysis Real life Scenarios Requirements No Requiements or Prerequists this course for Absolute Begginers Description This course is designed to provide an in-depth understanding of malware and its analysis. Students will learn the fundamentals of malware, types of malware, commodity vs APT malware, and the methodologies used to analyze it. The course will cover topics such as the introduction to Operating system and operating system functions and libraries, memory management, static and dynamic malware analysis.Students will learn how to build malware using various programming languages, and analyze it using different tools and techniques. The course will also cover malware analysis in a virtual environment, including setting up a malware analysis lab using virtual platforms and a variety of other software and tools.The course is structured to provide hands-on experience in analyzing malware. Students will gain practical experience in reverse engineering, behavior analysis, and system forensics. By the end of the course, students will be able to identify various types of malware and understand the mechanisms used by malware to evade detection.Learning Outcomes:Upon completion of the course, students will be able to:Understand the fundamentals of malware and its different typesDistinguish between commodity and APT malwareBuild malware using various programming languagesConduct static and dynamic malware analysisSet up a malware analysis lab using virtual platforms and various software toolsAnalyze the behavior of malware to understand its capabilities and potential impact on the systemUnderstand the functions of operating systems and operating system librariesConduct memory forensics to identify malware activity in memoryApply malware analysis techniques to identify and analyze advanced malware. Overview Section 1: Introduction Lecture 1 Introduction Lecture 2 Introduction to Malware Analysis Lecture 3 Resources Section 2: Introduction to Malware Lecture 4 What is Malware? Lecture 5 Malware Distribution Lecture 6 Commidity Vs. APT Malware Lecture 7 Types of Malware Lecture 8 Building Malware Section 3: Introduction to Operating System and Memory Lecture 9 Introduction to Operating System Part 1 Lecture 10 Introduction to Operating System Part 2 Lecture 11 Operating System Functions and Libraries Part 1 Lecture 12 Operating System Functions and Libraries part 2 Lecture 13 Introduction to main memory Section 4: Techniques Used in Malware Lecture 14 Reverse Binary Lecture 15 Obfuscation and Paking Software Section 5: Malware Analysis Lab Lecture 16 Download and Install Vmware Lecture 17 Download and Install VirtualBox Lecture 18 Download and Install Kali Linux Lecture 19 Download and Install Windows 11 VM Part 1 Lecture 20 Download and Install Windows 11 VM part 2 Lecture 21 Download and Install HashCalc Lecture 22 Download and Install Exeifo Lecture 23 Download and Install UPX Lecture 24 Download and Install PEstudio Lecture 25 Download and Install Hxd Lecture 26 Download and Install Bitext Lecture 27 Download and Install Process Monitor Lecture 28 Finalize your lab Section 6: Linux commands Essentials Lecture 29 Navigating File System Lecture 30 Users and Priviledges-1 Lecture 31 Users and Priviledges-2 Lecture 32 Networking Commands Lecture 33 Installing and Updating Tools Lecture 34 Controlling Kali Linux Services Lecture 35 Viewing, Creating and Editing Files Lecture 36 grep Commands part 1 Lecture 37 grep Commands part 2 Lecture 38 More Linux Commands Section 7: Introduction to PE Format Lecture 39 Introduction to PE Format Section 8: Start Malware Analysis Lecture 40 What is Malware Analysis Lecture 41 Static Malware Analysis Lecture 42 Dynamic Malware Analysis Lecture 43 Static Malware Analysis Phases Section 9: Practice Malware Analysis Lecture 44 Static Analysis- Submit the Hash of Malware Lecture 45 Static Analysis-Identifying the file type Lecture 46 Static Analysis- Extracting Strings Lecture 47 Static Analysis- Analyse the PE file Lecture 48 Static Analysis another Scenario Lecture 49 Practice Dynamic Analysis-1 Lecture 50 Practice Daynamic Analysis-2 Section 10: Practice Malware analysis in Kali Linux Lecture 51 Practice Malware Analysis in Kali Linux Anyone wants to Master Malware Analysis in Practical Method TurboBit RapidGator AlfaFile |