Learn how to detect, analyze, and defeat different types of malware, from viruses and worms to Trojans and backdoors.
Overview
Syllabus
Introduction
- Understanding what malware is and how it behaves
- What you should know
- Types of malware
- The evolution of malware
- How malware is delivered
- How malware works
- How malware achieves persistence
- Digging into rootkits
- Automating malware with botnets
- Virus construction kits
- Contemporary malware construction
- The MITRE ATT&CK repository
- Indicators of compromise
- Checking for anomalous behavior
- Sandboxing malware
- Hiding malware
- Malware that changes its spots
- Polymorphic malware
- Using cryptography in ransomware
- Understanding advanced persistent threats
- Analyzing Win32.Sodin
- Analyzing black and grey energy
- Understanding log4shell
- Using reverse engineering to understand code
- Considering malware in families
- Automated malware analysis
- Analyzing BlackEnergy and GreyEnergy
- Analyzing packers
- Disassembly with Ghidra
- What's next
Taught by
Malcolm Shore