Advanced Malware Analysis

Course

Online

£ 150 + VAT

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

Understand malware behavior and evade it using IDA Pro, OllyDbg, and WINDBG.In this video course, we cover advanced malware analysis topics. Towards this goal, we first understand the behavior of different classes of malware. Such knowledge helps us to easily categorize malware based on its characteristic. We see how sophisticated malware can use techniques to either evade detection or increase its damage and access to the system. Then we learn advanced techniques in static and dynamic malware analysis and cover the details and powerful features of OllyDbg, IDA Pro, and WINDBG. We also explore defense mechanisms against malware, create a signature for malware, and set up an intrusion detection system (IDS) to prevent attacks. Finally, we cover the concept of packers and unpackers, and explore how to unpack packed malware to analyze it.The code bundle for this video course is available at- About The AuthorMunir Njenga is a self-driven, multi-talented, technology enthusiast, cybersecurity consultant, and researcher. He mainly focuses on malware analysis, and web- and mobile-based application testing and methodologies. His skills and competencies stem from his active involvement in engagements that deliver advisory services such as network security reviews, security course development, training and capacity building, mobile and internet banking security reviews (BSS, MSC, HLR/AUC, IN, NGN, GGSN/SGSN), web applications, and network attack and penetration testing. Apart from his security hat, he is a poet, graphic designer, blogger, tool/application tester, social media marketer, web 2.0 developer and designer, naturalist, and traveler.

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

Malware behavior based on its class
Advanced dynamic and static malware analysis
Gain experience in working with OllyDbg, WINDBG, and IDA Pro
Detect and defend against malware
Master how packers and unpackers work

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

This centre's achievements

2021

All courses are up to date

The average rating is higher than 3.7

More than 50 reviews in the last 12 months

This centre has featured on Emagister for 4 years

Subjects

  • Network Training
  • Systems
  • Web
  • Workflow
  • Network
  • Testing
  • Infection

Course programme

Exploring Malware Functionalities 6 lectures 45:58 The Course Overview This video gives an overview of the entire course. Backdoors We are going to learn what exactly backdoors are and how they operate through examples. • Understand what malware is, what backdoors are, and what types of backdoors are available • Understand each type of backdoor target in a system • Gain insights through some examples of backdoors and their true intent in the systems they targeted at. Keyloggers and Information Stealers Learn what keyloggers are and how they contribute to information theft. Additionally it enables an attacker gain insight as to how they operate. • Understand what keyloggers and information stealers are by intent • Understand the various methods they use to get information out of a system to an attacker • Get a workflow of keylogger and information stealer delivery all the way to exfiltration. This gives insights that can be used for various analyses. Downloaders This video gives an understanding of the various stages of a malware attack and how downloaders contribute to the cycle. It also discusses the modes of distribution to give insights for prevention. • Understand the five stages of a malware attack • Understand the role of downloaders in the stages of a malware attack • Gain insights into how downloaders are spread to prevent them from landing on a network. Ransomware Ransomware has been one of the biggest threats in the current malware space. This video aims to give an understanding of what ransomware is and what distinguishes it from other malware. • Understand what ransomware is and how it differs from other forms of malware • Gain an understanding of the working of ransomware and various examples of it • Understand how to prevent infection through ransomware. These practices not only help in day-to-day use but are also applicable to analysts and for preventing self-infection. Rootkits Rootkits are very sophisticated forms of malware and this video explores what they are, their effects, and various types of rootkits in the wild. • Gain an understanding of what rootkits are and various components that make up a rootkit • Understand the various layers a rootkit affects and what that means in terms of impact • Learn the various types of rootkits and what it means when they successfully infect a host. This is useful for analysis strategies Exploring Malware Functionalities- Quiz Exploring Malware Functionalities. 6 lectures 45:58 The Course Overview This video gives an overview of the entire course. Backdoors We are going to learn what exactly backdoors are and how they operate through examples. • Understand what malware is, what backdoors are, and what types of backdoors are available • Understand each type of backdoor target in a system • Gain insights through some examples of backdoors and their true intent in the systems they targeted at. Keyloggers and Information Stealers Learn what keyloggers are and how they contribute to information theft. Additionally it enables an attacker gain insight as to how they operate. • Understand what keyloggers and information stealers are by intent • Understand the various methods they use to get information out of a system to an attacker • Get a workflow of keylogger and information stealer delivery all the way to exfiltration. This gives insights that can be used for various analyses. Downloaders This video gives an understanding of the various stages of a malware attack and how downloaders contribute to the cycle. It also discusses the modes of distribution to give insights for prevention. • Understand the five stages of a malware attack • Understand the role of downloaders in the stages of a malware attack • Gain insights into how downloaders are spread to prevent them from landing on a network. Ransomware Ransomware has been one of the biggest threats in the current malware space. This video aims to give an understanding of what ransomware is and what distinguishes it from other malware. • Understand what ransomware is and how it differs from other forms of malware • Gain an understanding of the working of ransomware and various examples of it • Understand how to prevent infection through ransomware. These practices not only help in day-to-day use but are also applicable to analysts and for preventing self-infection. Rootkits Rootkits are very sophisticated forms of malware and this video explores what they are, their effects, and various types of rootkits in the wild. • Gain an understanding of what rootkits are and various components that make up a rootkit • Understand the various layers a rootkit affects and what that means in terms of impact • Learn the various types of rootkits and what it means when they successfully infect a host. This is useful for analysis strategies Exploring Malware Functionalities- Quiz The Course Overview This video gives an overview of the entire course. The Course Overview This video gives an overview of the entire course. The Course Overview This video gives an overview of the entire course. The Course Overview This video gives an overview of the entire course. This video gives an overview of the entire course. This video gives an overview of the entire course. Backdoors We are going to learn what exactly backdoors are and how they operate through examples. • Understand what malware is, what backdoors are, and what types of backdoors are available • Understand each type of backdoor target in a system • Gain insights through some examples of backdoors and their true intent in the systems they targeted at. Backdoors We are going to learn what exactly backdoors are and how they operate through examples. • Understand what malware is, what backdoors are, and what types of backdoors are available • Understand each type of backdoor target in a system • Gain insights through some examples of backdoors and their true intent in the systems they targeted at. Backdoors We are going to learn what exactly backdoors are and how they operate through examples. • Understand what malware is, what backdoors are, and what types of backdoors are available • Understand each type of backdoor target in a system • Gain insights through some examples of backdoors and their true intent in the systems they targeted at. Backdoors We are going to learn what exactly backdoors are and how they operate through examples. • Understand what malware is, what backdoors are, and what types of backdoors are available • Understand each type of backdoor target in a system • Gain insights through some examples of backdoors and their true intent in the systems they targeted at. We are going to learn what exactly backdoors are and how they operate through examples. • Understand what malware is, what backdoors are, and what types of backdoors are available • Understand each type of backdoor target in a system • Gain insights through some examples of backdoors and their true intent in the systems they targeted at. We are going to learn what exactly backdoors are and how they operate through examples. • Understand what malware is, what backdoors are, and what types of backdoors are available • Understand each type of backdoor target in a system • Gain insights through some examples of backdoors and their true intent in the systems they targeted at. Keyloggers and Information Stealers Learn what keyloggers are and how they contribute to information theft. Additionally it enables an attacker gain insight as to how they operate. • Understand what keyloggers and information stealers are by intent • Understand the various methods they use to get information out of a system to an attacker • Get a workflow of keylogger and information stealer delivery all the way to exfiltration. This gives insights that can be used for various analyses. Keyloggers and Information Stealers Learn what keyloggers are and how they contribute to information theft. Additionally it enables an attacker gain insight as to how they operate. • Understand what keyloggers and information stealers are by intent • Understand the various methods they use to get information out of a system to an attacker • Get a workflow of keylogger and information stealer delivery all the way to exfiltration. This gives insights that can be used for various analyses. Keyloggers and Information Stealers Learn what keyloggers are and how they contribute to information theft. Additionally it enables an attacker gain insight as to how they operate. • Understand what keyloggers and information stealers are by intent • Understand the various methods they use to get information out of a system to an attacker • Get a workflow of keylogger and information stealer delivery all the way to exfiltration. This gives insights that can be used for various analyses. Keyloggers and Information Stealers Learn what keyloggers are and how they contribute to information theft. Additionally it enables an attacker gain insight as to how they operate. • Understand what keyloggers and information stealers are by intent • Understand the various methods they use to get information out of a system to an attacker • Get a workflow of keylogger and information stealer delivery all the way to exfiltration. This gives insights that can be used for various analyses. Learn what keyloggers are and how they contribute to information theft. Additionally it enables an attacker gain insight as to how they operate. • Understand what keyloggers and information stealers are by intent • Understand the various methods they use to get information out of a system to an attacker • Get a workflow of keylogger and information stealer delivery all the way to exfiltration. This gives insights that can be used for various analyses. Learn what keyloggers are and how they contribute to information theft. Additionally it enables an attacker gain insight as to how they operate. • Understand what keyloggers and information stealers are by intent • Understand the various methods they use to get information out of a system to an attacker • Get a workflow of keylogger and information stealer delivery all the way to exfiltration. This gives insights that can be used for various analyses. Downloaders This video gives an understanding of the various stages of a malware attack and how downloaders contribute to the cycle. It also discusses the modes of distribution to give insights for prevention. • Understand the five stages of a malware attack • Understand the role of downloaders in the stages of a malware attack • Gain insights into how downloaders are spread to prevent them from landing on a network. Downloaders This video gives an understanding of the various stages of a malware attack and how downloaders contribute to the cycle. It also discusses the modes of distribution to give insights for prevention. • Understand the five stages of a malware attack • Understand the role of downloaders in the stages of a malware attack • Gain insights into how downloaders are spread to prevent them from landing on a network. Downloaders This video gives an understanding of the various stages of a malware attack and how downloaders contribute to the cycle. It also discusses the modes of distribution to give insights for prevention. • Understand the five stages of a malware attack • Understand the role of downloaders in the stages of a malware attack • Gain insights into how downloaders are spread to prevent them from landing on a network. Downloaders This video gives an understanding of the various stages of a malware attack and how downloaders contribute to the cycle. It also discusses the modes of distribution to give insights for prevention. • Understand the five stages of a malware attack • Understand the role of downloaders in the stages of a malware attack • Gain insights into how downloaders are spread to prevent them from landing on a network. This video gives an understanding of the various stages of a malware attack and how downloaders contribute to the cycle. It also discusses the modes of distribution to give insights for prevention. • Understand the five stages of a malware attack • Understand the role of downloaders in the stages of a malware attack • Gain insights into how downloaders are spread to prevent them from landing on a network. This video gives an understanding of the various stages of a malware attack and how downloaders contribute to the cycle. It also discusses the modes of distribution to give insights for prevention. • Understand the five stages of a malware attack • Understand the role of downloaders in the stages of a malware attack • Gain insights into how downloaders are spread to prevent them from landing on a network. Ransomware Ransomware has been one of the biggest threats in the current malware space. This video aims to give an understanding of what ransomware is and what distinguishes it from other malware. • Understand what ransomware is and how it differs from other forms of malware • Gain an understanding of the working of ransomware and various examples of it • Understand how to prevent infection through ransomware. These practices not only help in day-to-day use but are also applicable to analysts and for preventing self-infection. Ransomware Ransomware has been one of the biggest threats in the current malware space. This video aims to give an understanding of what ransomware is and what distinguishes it from other malware. • Understand what ransomware is and how it differs from other forms of malware • Gain an understanding of the working of ransomware and various examples of it • Understand how to prevent infection through ransomware. These practices not only help in day-to-day use but are also applicable to analysts and for preventing self-infection. Ransomware Ransomware has been one of the biggest threats in the current malware space. This video aims to give an understanding of what ransomware is and what distinguishes it from other malware. • Understand what ransomware is and how it differs from other forms of malware • Gain an understanding of the working of ransomware and various examples of it • Understand how to prevent infection through ransomware. These practices not only help in day-to-day use but are also applicable to analysts and for preventing self-infection. Ransomware Ransomware has been one of the biggest threats in the current malware space. This video aims to give an understanding of what ransomware is and what distinguishes it from other malware. • Understand what ransomware is and how it differs from other forms of malware • Gain an understanding of the working of ransomware and various examples of it • Understand how to prevent infection through ransomware. These practices not only help in day-to-day use but are also applicable to analysts and for preventing self-infection. Ransomware has been one of the biggest threats in the current malware space. This video aims to give an understanding of what ransomware is and what distinguishes it from other malware rstanding of what rootkits are and various...

Additional information

Malware Analysis,IDA Pro, OllyDbg, and WINDBG

Advanced Malware Analysis

£ 150 + VAT