Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LinkedIn Learning

Ethical Hacking: The Complete Malware Analysis Process

via LinkedIn Learning

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn how to detect, analyze, and defeat different types of malware, from viruses and worms to Trojans and backdoors.

Syllabus

Introduction
  • Understanding what malware is and how it behaves
  • What you should know
1. Introduction to Malware
  • Types of malware
  • The evolution of malware
  • How malware is delivered
  • How malware works
  • How malware achieves persistence
  • Digging into rootkits
  • Automating malware with botnets
  • Virus construction kits
  • Contemporary malware construction
  • The MITRE ATT&CK repository
2. Malware Detection
  • Indicators of compromise
  • Checking for anomalous behavior
  • Sandboxing malware
3. Advanced Techniques
  • Hiding malware
  • Malware that changes its spots
  • Polymorphic malware
  • Using cryptography in ransomware
  • Understanding advanced persistent threats
  • Analyzing Win32.Sodin
  • Analyzing black and grey energy
4. Reverse Engineering Malware
  • Using reverse engineering to understand code
  • Considering malware in families
  • Automated malware analysis
  • Analyzing BlackEnergy and GreyEnergy
  • Analyzing packers
  • Disassembly with Ghidra
Conclusion
  • What's next

Taught by

Malcolm Shore

Reviews

4.7 rating at LinkedIn Learning based on 212 ratings

Start your review of Ethical Hacking: The Complete Malware Analysis Process

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.