Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Malware Analysis For Absolute Begginers

    Posted By: ELK1nG
    Malware Analysis For Absolute Begginers

    Malware Analysis For Absolute Begginers
    Published 5/2023
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 2.94 GB | Duration: 6h 1m

    Practice Malware Analysis

    What you'll learn

    Understand the fundamental of Malware.

    Master Malware Concepts and Techniques

    Practice Statice Malware Analysis

    Practice Dynamic Malware Analysis

    Build Malware Analysis Lab

    Master Malware analysis tools

    Analysis Real life Scenarios

    Requirements

    No Requiements or Prerequists this course for Absolute Begginers

    Description

    This course is designed to provide an in-depth understanding of malware and its analysis. Students will learn the fundamentals of malware, types of malware, commodity vs APT malware, and the methodologies used to analyze it. The course will cover topics such as the introduction to Operating system and operating system functions and libraries, memory management, static and dynamic malware analysis.Students will learn how to build malware using various programming languages, and analyze it using different tools and techniques. The course will also cover malware analysis in a virtual environment, including setting up a malware analysis lab using virtual platforms and a variety of other software and tools.The course is structured to provide hands-on experience in analyzing malware. Students will gain practical experience in reverse engineering, behavior analysis, and system forensics. By the end of the course, students will be able to identify various types of malware and understand the mechanisms used by malware to evade detection.Learning Outcomes:Upon completion of the course, students will be able to:Understand the fundamentals of malware and its different typesDistinguish between commodity and APT malwareBuild malware using various programming languagesConduct static and dynamic malware analysisSet up a malware analysis lab using virtual platforms and various software toolsAnalyze the behavior of malware to understand its capabilities and potential impact on the systemUnderstand the functions of operating systems and operating system librariesConduct memory forensics to identify malware activity in memoryApply malware analysis techniques to identify and analyze advanced malware.

    Overview

    Section 1: Introduction

    Lecture 1 Introduction

    Lecture 2 Introduction to Malware Analysis

    Lecture 3 Resources

    Section 2: Introduction to Malware

    Lecture 4 What is Malware?

    Lecture 5 Malware Distribution

    Lecture 6 Commidity Vs. APT Malware

    Lecture 7 Types of Malware

    Lecture 8 Building Malware

    Section 3: Introduction to Operating System and Memory

    Lecture 9 Introduction to Operating System Part 1

    Lecture 10 Introduction to Operating System Part 2

    Lecture 11 Operating System Functions and Libraries Part 1

    Lecture 12 Operating System Functions and Libraries part 2

    Lecture 13 Introduction to main memory

    Section 4: Techniques Used in Malware

    Lecture 14 Reverse Binary

    Lecture 15 Obfuscation and Paking Software

    Section 5: Malware Analysis Lab

    Lecture 16 Download and Install Vmware

    Lecture 17 Download and Install VirtualBox

    Lecture 18 Download and Install Kali Linux

    Lecture 19 Download and Install Windows 11 VM Part 1

    Lecture 20 Download and Install Windows 11 VM part 2

    Lecture 21 Download and Install HashCalc

    Lecture 22 Download and Install Exeifo

    Lecture 23 Download and Install UPX

    Lecture 24 Download and Install PEstudio

    Lecture 25 Download and Install Hxd

    Lecture 26 Download and Install Bitext

    Lecture 27 Download and Install Process Monitor

    Lecture 28 Finalize your lab

    Section 6: Linux commands Essentials

    Lecture 29 Navigating File System

    Lecture 30 Users and Priviledges-1

    Lecture 31 Users and Priviledges-2

    Lecture 32 Networking Commands

    Lecture 33 Installing and Updating Tools

    Lecture 34 Controlling Kali Linux Services

    Lecture 35 Viewing, Creating and Editing Files

    Lecture 36 grep Commands part 1

    Lecture 37 grep Commands part 2

    Lecture 38 More Linux Commands

    Section 7: Introduction to PE Format

    Lecture 39 Introduction to PE Format

    Section 8: Start Malware Analysis

    Lecture 40 What is Malware Analysis

    Lecture 41 Static Malware Analysis

    Lecture 42 Dynamic Malware Analysis

    Lecture 43 Static Malware Analysis Phases

    Section 9: Practice Malware Analysis

    Lecture 44 Static Analysis- Submit the Hash of Malware

    Lecture 45 Static Analysis-Identifying the file type

    Lecture 46 Static Analysis- Extracting Strings

    Lecture 47 Static Analysis- Analyse the PE file

    Lecture 48 Static Analysis another Scenario

    Lecture 49 Practice Dynamic Analysis-1

    Lecture 50 Practice Daynamic Analysis-2

    Section 10: Practice Malware analysis in Kali Linux

    Lecture 51 Practice Malware Analysis in Kali Linux

    Anyone wants to Master Malware Analysis in Practical Method