Completed
Malware analysis and reverse engineering expert - Lecture 1 - Don't just buy the course.
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Malware Analysis and Reverse Engineering Course
Automatically move to the next video in the Classroom when playback concludes
- 1 Malware analysis and reverse engineering expert - Lecture 1 - Don't just buy the course.
- 2 Malware analysis and reverse engineering expert - Lecture 2 - Malware
- 3 Malware analysis and reverse engineering expert - Lecture 3 - Replicator
- 4 Malware analysis and reverse engineering expert - Lecture 4 - Concealer
- 5 Malware analysis and reverse engineering expert - Lecture 5 - Bomb
- 6 Malware analysis and reverse engineering expert - Lecture 6 - What is Malware Analysis
- 7 Malware analysis and reverse engineering expert - Lecture 7 - Viruses
- 8 Malware analysis and reverse engineering expert - Lecture 8 - Trojans
- 9 Malware analysis and reverse engineering expert - Lecture 9 - Worms
- 10 Malware analysis and reverse engineering expert - Lecture 10 - Rootkits
- 11 Malware analysis and reverse engineering expert - Lecture 11 - Adwares
- 12 Malware analysis and reverse engineering expert - Lecture 12 - Ransomware
- 13 Malware analysis and reverse engineering expert - Lecture 13 - Backdoors
- 14 Malware analysis and reverse engineering expert - Lecture 14 - Malware Infection Statistics
- 15 Malware analysis and reverse engineering expert - Lecture 15 - Malware Code Reversing.
- 16 Malware analysis and reverse engineering expert - Lecture 16 - Interaction Analysis
- 17 Malware analysis and reverse engineering expert - Lecture 17 - Static Properties Analysis
- 18 Malware analysis and reverse engineering expert - Lecture 18 - Automated Analysis
- 19 Malware analysis and reverse engineering expert - Lecture 19 - Downloading and Installing VirtualBox
- 20 Malware analysis and reverse engineering expert - Lecture 20 - Flare VM
- 21 Malware analysis and reverse engineering expert - Lecture 21 - Flare VM method 2
- 22 Malware analysis and reverse engineering expert - Lecture 22 - Snapshots and Other important setting
- 23 Malware analysis and reverse engineering expert - Lecture 23 - Dynamic Malware Analysis - Processes
- 24 Malware analysis and reverse engineering expert - Lecture 24 - Dynamic Malware Analysis Of Network
- 25 Malware analysis and reverse engineering expert - Lecture 25 - Dynamic Malware Analysis of Registry
- 26 Malware analysis and reverse engineering expert - Lecture 26 - What are debuggers - Keyterms
- 27 Malware analysis and reverse engineering expert - Lecture 27 - Working with OllyDbg - Debugging
- 28 Malware analysis and reverse engineering expert - Lecture 28 - x86 Architecture assembly language
- 29 Malware analysis and reverse engineering expert - Lecture 29 - Analysing binded multimedia malwares
- 30 Malware analysis and reverse engineering expert - Lecture 30 - Extracting Malware Binaries