Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.
Description
Learn how to detect, analyze, and defeat different types of malware, from viruses and worms to Trojans and backdoors.
Tags
Syllabus
Introduction
- Understanding what malware is and how it behaves
- What you should know
- Types of malware
- The evolution of malware
- How malware is delivered
- How malware works
- How malware achieves persistence
- Digging into rootkits
- Automating malware with botnets
- Virus construction kits
- Contemporary malware construction
- The MITRE ATT&CK repository
- Indicators of compromise
- Checking for anomalous behavior
- Sandboxing malware
- Hiding malware
- Malware that changes its spots
- Polymorphic malware
- Using cryptography in ransomware
- Understanding advanced persistent threats
- Analyzing Win32.Sodin
- Analyzing black and grey energy
- Using reverse engineering to understand code
- Considering malware in families
- Automated malware analysis
- Analyzing BlackEnergy and GreyEnergy
- Analyzing packers
- Disassembly with Ghidra
- What's next
![](https://d3f1iyfxxz8i1e.cloudfront.net/courses/course_image/5055d6ccf4d7.jpeg)
Ethical Hacking: The Complete Malware Analysis Process
Affiliate notice
-
TypeOnline Course
-
Provider
Learn how to detect, analyze, and defeat different types of malware, from viruses and worms to Trojans and backdoors.
Introduction
- Understanding what malware is and how it behaves
- What you should know
- Types of malware
- The evolution of malware
- How malware is delivered
- How malware works
- How malware achieves persistence
- Digging into rootkits
- Automating malware with botnets
- Virus construction kits
- Contemporary malware construction
- The MITRE ATT&CK repository
- Indicators of compromise
- Checking for anomalous behavior
- Sandboxing malware
- Hiding malware
- Malware that changes its spots
- Polymorphic malware
- Using cryptography in ransomware
- Understanding advanced persistent threats
- Analyzing Win32.Sodin
- Analyzing black and grey energy
- Using reverse engineering to understand code
- Considering malware in families
- Automated malware analysis
- Analyzing BlackEnergy and GreyEnergy
- Analyzing packers
- Disassembly with Ghidra
- What's next
Tags
Loading...
Saving...
Loading...