Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Ethical Hacking: The Complete Malware Analysis Process

Description

Learn how to detect, analyze, and defeat different types of malware, from viruses and worms to Trojans and backdoors.

Tags

Syllabus

Introduction
  • Understanding what malware is and how it behaves
  • What you should know
1. Introduction to Malware
  • Types of malware
  • The evolution of malware
  • How malware is delivered
  • How malware works
  • How malware achieves persistence
  • Digging into rootkits
  • Automating malware with botnets
  • Virus construction kits
  • Contemporary malware construction
  • The MITRE ATT&CK repository
2. Malware Detection
  • Indicators of compromise
  • Checking for anomalous behavior
  • Sandboxing malware
3. Advanced Techniques
  • Hiding malware
  • Malware that changes its spots
  • Polymorphic malware
  • Using cryptography in ransomware
  • Understanding advanced persistent threats
  • Analyzing Win32.Sodin
  • Analyzing black and grey energy
4. Reverse Engineering Malware
  • Using reverse engineering to understand code
  • Considering malware in families
  • Automated malware analysis
  • Analyzing BlackEnergy and GreyEnergy
  • Analyzing packers
  • Disassembly with Ghidra
Conclusion
  • What's next

Online Course


Ethical Hacking: The Complete Malware Analysis Process

Affiliate notice

Learn how to detect, analyze, and defeat different types of malware, from viruses and worms to Trojans and backdoors.

Introduction
  • Understanding what malware is and how it behaves
  • What you should know
1. Introduction to Malware
  • Types of malware
  • The evolution of malware
  • How malware is delivered
  • How malware works
  • How malware achieves persistence
  • Digging into rootkits
  • Automating malware with botnets
  • Virus construction kits
  • Contemporary malware construction
  • The MITRE ATT&CK repository
2. Malware Detection
  • Indicators of compromise
  • Checking for anomalous behavior
  • Sandboxing malware
3. Advanced Techniques
  • Hiding malware
  • Malware that changes its spots
  • Polymorphic malware
  • Using cryptography in ransomware
  • Understanding advanced persistent threats
  • Analyzing Win32.Sodin
  • Analyzing black and grey energy
4. Reverse Engineering Malware
  • Using reverse engineering to understand code
  • Considering malware in families
  • Automated malware analysis
  • Analyzing BlackEnergy and GreyEnergy
  • Analyzing packers
  • Disassembly with Ghidra
Conclusion
  • What's next