Ethical Hacking: The Complete Malware Analysis Process
With Malcolm Shore
Liked by 4,403 users
Duration: 1h 52m
Skill level: Intermediate
Released: 8/15/2019
Course details
The key to effectively protecting your systems is understanding the attacks you have to defend them against. Join instructor Malcolm Shore for a hands-on introduction to the many different types of malware that can be used to exploit a target computer.
Explore ethical hacking strategies to:
- Protect your data from different types of malware including viruses, worms, Trojans, and backdoors.
- Identify places where malware hides and detect it to protect your networks and systems against cyberattacks.
- Reverse-engineer malware to understand how it operates.
- Identify malware construction kits called “botnets,” which are used to automate malware.
- Understand the use of cryptography in ransomware.
- Analyze Win32.Sodin, Log4Shell, Black Energy, and Grey Energy droppers and packers.
- Utilize open-source malware analysis tools such as MITRE ATT$CK and Ghidra.
Skills you’ll gain
Earn a sharable certificate
Share what you’ve learned, and be a standout professional in your desired industry with a certificate showcasing your knowledge gained from the course.
LinkedIn Learning
Certificate of Completion
-
Showcase on your LinkedIn profile under “Licenses and Certificate” section
-
Download or print out as PDF to share with others
-
Share as image online to demonstrate your skill
Meet the instructor
Learner reviews
-
Rogers Quintero Gélvez
Rogers Quintero Gélvez
Consultor en tecnología y servicios empresariales. Especialista en transformación digital, TIC y metodologías ágiles como SCRUM, Economía Plateada…
-
Sitesh Adhikari
Sitesh Adhikari
App Development Mentor | Flutter & iOS | Teaching Students & Founders
Contents
What’s included
- Practice while you learn 1 exercise file
- Test your knowledge 4 quizzes
- Learn on the go Access on tablet and phone