Ethical Hacking: The Complete Malware Analysis Process
With Malcolm Shore
Liked by 3,551 users
Duration: 1h 52m
Skill level: Intermediate
Released: 8/15/2019
Course details
The key to effectively protecting your systems is understanding the attacks you have to defend them against. Join instructor Malcolm Shore for a hands-on introduction to the many different types of malware that can be used to exploit a target computer.
Explore ethical hacking strategies to:
- Protect your data from different types of malware including viruses, worms, Trojans, and backdoors.
- Identify places where malware hides and detect it to protect your networks and systems against cyberattacks.
- Reverse-engineer malware to understand how it operates.
- Identify malware construction kits called “botnets,” which are used to automate malware.
- Understand the use of cryptography in ransomware.
- Analyze Win32.Sodin, Log4Shell, Black Energy, and Grey Energy droppers and packers.
- Utilize open-source malware analysis tools such as MITRE ATT$CK and Ghidra.
Skills you’ll gain
Earn a sharable certificate
Share what you’ve learned, and be a standout professional in your desired industry with a certificate showcasing your knowledge gained from the course.
LinkedIn Learning
Certificate of Completion
-
Showcase on your LinkedIn profile under “Licenses and Certificate” section
-
Download or print out as PDF to share with others
-
Share as image online to demonstrate your skill
Meet the instructor
Learner reviews
-
Dominic Gonsalves CPPD
Dominic Gonsalves CPPD
Project Management; Senior Manager Train Services Transport Infrastructure; PFAS Remediation; Bosch-Protec Systems; Professional Services; Defence &…
-
Arazi Jemima
Arazi Jemima
Studying at University of Derby
Contents
What’s included
- Practice while you learn 1 exercise file
- Test your knowledge 4 quizzes
- Learn on the go Access on tablet and phone