I have found this course in an hdd that i don't really use so much, is it interesting for someone ? tell me and i will upload it, here is the summary :
What do you learn in this course?
first day:
What do you learn in this course?
- How malware and Windows internals work
- How to create a safe and isolated lab environment for malware analysis
- Tools and techniques to perform malware analysis
- How to perform static analysis to determine the metadata associated with malware
- How to perform dynamic analysis of the malware to determine its interaction with process, file system, registry, and network
- How to perform code analysis to determine the malware functionality
- How to debug malware using tools like IDA Pro and x64dbg
- How to analyze downloaders, droppers, keyloggers, fileless malwares, HTTP backdoors, etc
- Understanding various persistence techniques used by the attackers
- Understanding different code injection techniques used to bypass security products
- What is Memory Forensics and its use in malware and digital investigation
- Ability to acquire a memory image from suspect/infected systems
- How to use open source advanced memory forensics framework (Volatility)
- Understanding of the techniques used by the malwares to hide from live forensic tools
- Understanding of the techniques used by rootkits (code injection, hooking, etc.)
- Investigative steps for detecting stealth and advanced malware
- How memory forensics helps in malware analysis and reverse engineering
- How to incorporate malware analysis and memory forensics in the sandbox
- How to determine the network and host-based indicators (IOC)
- Techniques to hunt malwares
first day:
- Introduction to Malware Analysis
- Static Analysis
- Dynamic Analysis/Behavioral analysis
- Automating Malware Analysis (sandbox)
- code analysis
- Introduction to Memory Forensics
- Volatility Overview
- Investigating Process
- Investigating Process handles & Registry
- Investigating Network Activities
- Memory Process Investigation
- Investigating User-Mode Rootkits & Fileless Malwares
- Memory Forensics in Sandbox technology
- Investigating Kernel-Mode Rootkits
- Memory Forensic Case Studies
Последнее редактирование модератором: