وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Advanced Malware Analysis: Redux

سرفصل های دوره

Do you have knowledge of malware analysis core concepts, but want to transition from malware analyst to reverse engineer? Brian Rogalski, CEO of Hexcapes, equips you to handle complex tasks such as extracting, debugging, disassembling, unpacking, and hunting malware as he reacquaints you with key analysis topics and exercises. Get ready for the rest of the course with a review of Windows OS, PE files and memory, WinAPI and Registry, and common malware behaviors. Go over x86 and x64 architecture, and then dive into dynamic and static malware analysis. Explore malware challenges, including malware packers, obfuscation, identifying encryption, anti-analysis, and memory analysis. This course helps you gain the hands-on experience you need to level up.

This course was created by Cybrary. We are pleased to host this training in our library.


01 - 1. RE Preparation
  • 01 - Module 1 objectives
  • 02 - Reverse engineering process review
  • 03 - Malware analysis tools
  • 04 - Malware handling
  • 05 - Malware components part 1 Windows OS
  • 06 - Malware components part 2 PE files and memory
  • 07 - Malware components part 3 WinAPI and Registry
  • 08 - Malware components part 4 Malware behaviors
  • 09 - Module 1 summary

  • 02 - 2. x86 and x64 Architecture
  • 01 - Module 2 objectives
  • 02 - Numbering systems
  • 03 - Computer architecture part 1 x86x64
  • 04 - Computer architecture part 2 Assembly Language
  • 05 - Computer architecture part 3 Control flow and stack
  • 06 - Module 2 summary

  • 03 - 3. Dynamic and Static Malware Analysis
  • 01 - Module 3 objectives
  • 02 - Dynamic analysis process part 1
  • 03 - Dynamic analysis process part 2
  • 04 - Dynamic analysis process part 3 Advanced analysis
  • 05 - Static analysis part 1
  • 06 - Static analysis part 2
  • 07 - Module 3 summary

  • 04 - 4. Malware Challenges
  • 01 - Module 4 objectives
  • 02 - Malware packers part 1
  • 03 - Malware packers part 2
  • 04 - Obfuscation part 1
  • 05 - Obfuscation part 2 XOR
  • 06 - Obfuscation part 3 base64
  • 07 - Identifying encryption
  • 08 - Anti-analysis part 1
  • 09 - Anti-analysis part 2
  • 10 - Module 4 summary

  • 05 - 5. Memory Analysis
  • 01 - Module 5 objectives
  • 02 - Forensics process
  • 03 - Memory analysis part 1
  • 04 - Memory analysis part 2
  • 05 - Module 5 summary
  • 06 - Course summary
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 24064
    حجم: 479 مگابایت
    مدت زمان: 221 دقیقه
    تاریخ انتشار: 12 آذر 1402
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید