×
Order Processing
Checkout
Full Name:
Email address:
Password:
Retype Password:
Existing User
Existing User
Continue
Exclusive features inside this offer:
30 Days Money Back Guarantee
Instant Certificate of Completion
Lifetime Access
Get up to date Information
Practical Knowledge
Best Teaching Methodology
Quick access, anytime & anywhere
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Malware Analysis Expert - Analyzing Malware from the core
2. Everything you need to know
2.1 Malware (1:36)
2.2 Replicators (1:17)
2.3 Concealer (1:11)
2.4 Bomb (1:15)
2.5 Malware Analysis (1:01)
3. Types of Malware
3.1 Viruses (1:11)
3.2 Trojans (1:09)
3.3 Worms (1:01)
3.4 Rootkits (0:44)
3.5 Adware (0:56)
3.6 Ransomware (0:56)
3.7 Backdoors (1:01)
3.8 Malware Infection Statistics (3:31)
4. Methodology of Malware Analysis
4.1 Manual Code Reversing. (0:58)
4.2 Interactive behavior Analysis (1:01)
4.3 Static Properties Analysis (0:58)
4.4 Automated Analysis (1:16)
5. Setting Up Lab
5.1 Downloading and Installing VirtualBox (2:16)
5.2 Flare VM (6:06)
5.3 Flare VM - Method 2 (4:06)
5.4 Snapshots and Other Important Settings (4:40)
6. Dynamic Malware Analysis
6.1 Dynamic Malware Analysis of Processes (6:06)
6.2 Dynamic Malware Analysis of Network (5:31)
6.3 Dynamic Malware Analysis of Registry (3:24)
7. All about debuggers
7.1 Debuggers and Key terms. (3:04)
7.2 Working with OllyDbg (8:03)
8. Static Malware Analysis
8.1 x86 Architecture and Assembly language. (5:11)
8.2 Analyzing Binded Multimedia Malware using Hex-Editors. (4:17)
8.3 Extracting malware binaries. (4:17)
3.4 Rootkits
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock