Advanced Malware Analysis [Video]

Understand malware behavior and evade it using IDA Pro, OllyDbg, and WINDBG

In this video course, we cover advanced malware analysis topics. Towards this goal, we first understand the behavior of different classes of malware. Such knowledge helps us to easily categorize malware based on its characteristic. We see how sophisticated malware can use techniques to either evade detection or increase its damage and access to the system.

Then we learn advanced techniques in static and dynamic malware analysis and cover the details and powerful features of OllyDbg, IDA Pro, and WINDBG. We also explore defense mechanisms against malware, create a signature for malware, and set up an intrusion detection system (IDS) to prevent attacks.

Finally, we cover the concept of packers and unpackers, and explore how to unpack packed malware to analyze it.

The code bundle for this video course is available at- https://github.com/PacktPublishing/-Advanced-Malware-Analysis

Style and Approach

Through this course, complicated concepts in malware analysis are explained in simple language so that everyone can understand the fundamental concepts; this is enhanced by many examples of using tools to analyze malware manually and automatically.

What You Will Learn

  • Malware behavior based on its class
  • Advanced dynamic and static malware analysis
  • Gain experience in working with OllyDbg, WINDBG, and IDA Pro
  • Detect and defend against malware
  • Master how packers and unpackers work

Authors

Munir Njenga

Munir Njenga is a self-driven, multi-talented, technology enthusiast, cybersecurity consultant, and researcher. He mainly focuses on malware analysis, and web- and mobile-based application testing and methodologies.

His skills and competencies stem from his active involvement in engagements that deliver advisory services such as network security reviews, security course development, training and capacity building, mobile and internet banking security reviews (BSS, MSC, HLR/AUC, IN, NGN, GGSN/SGSN), web applications, and network attack and penetration testing.

Related Posts:   [PACKTPUB] MASTER BIG DATA INGESTION AND ANALYTICS WITH FLUME, SQOOP, HIVE AND SPARK [VIDEO]

Apart from his security hat, he is a poet, graphic designer, blogger, tool/application tester, social media marketer, web 2.0 developer and designer, naturalist, and traveller.

 

 

Password: Click ME

 Note :  If Google Drive Give some Error Then Scroll Page And Check Video

 

 

Please complete the required fields.




This site comply with DMCA digital copyright. We do not store files not owned by us, or without the permission of the owner. We also do not have links that lead to sites DMCA copyright infringement.

 

If You feel that this Course is belong to you and you want to unpublish it, Please Contact us .

Related Posts