×
Order Processing
Checkout
Full Name:
Email address:
Password:
Retype Password:
Existing User
Existing User
Continue
Exclusive features inside this offer:
30 Days Money Back Guarantee
Instant Certificate of Completion
Lifetime Access
Get up to date Information
Practical Knowledge
Best Teaching Methodology
Quick access, anytime & anywhere
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Malware Analysis & Reverse Engineering for Beginners
Recipe 1: Malware Terminologies & Propagation
1.1 Intro (0:28)
1.2 Malware Classification (3:29)
1.3 Malware propogation techniques (2:53)
1.4 Common file types and Infection examples (1:35)
Slides
Recipe 2: Malware Analysis Concepts
2.1 Intro (0:48)
2.2 Infection scenario (1:48)
2.3 Malware Analysis And its type (3:26)
2.4 General Rules, Signatures and Obfuscation (1) (2:04)
Slides
Recipe 3: Lab Setup
3.1 Intro (0:20)
3.2 Setting up virtual environment and windows vm (4:12)
3.3 Wireshark installation and issue fix (4:07)
3.4 Installing static analysis tools (2:19)
Slides
Recipe 4: Static Analysis
4.1 Intro (0:27)
4.2 Using Virustotal and intezer (3:35)
4.3 Hash and Strings (5:56)
4.4 Malware Packing (4:24)
4.5 PE header Analysis (9:48)
Slides
Download Malware Sample
Recipe 5: Dynamic Analysis
5.1 Intro (1:05)
5.2 Process Monitoring (4:51)
5.3 Registry Analysis (4:16)
5.4 Network Activity Analysis (6:18)
5.5 File Changes Monitoring (2:39)
5.6 Sandboxes (4:42)
Slides
Download Samples
Recipe 6: Reversing Malware
6.1 Intro (0:21)
6.2 Intro to RE (4:31)
6.3 RE Lab (8:31)
6.4. Malware RE Demo (9:29)
Slides
Download Sample
3.4 Installing static analysis tools
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock