Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed at ante vitae nulla vulputate elementum. Maecenas imperdiet malesuada lacinia. Donec sit amet aliquet urna. Nam sit amet eros dapibus, commodo ligula a, imperdiet mi. Fusce rhoncus eros in leo rutrum, at lobortis leo sodales. Quisque nibh tellus, rutrum placerat turpis ac, ullamcorper suscipit nisl. Nullam faucibus quam a leo imperdiet, vel blandit nibh iaculis. Duis efficitur ipsum eu eros fermentum, in volutpat erat tincidunt. Curabitur sit amet vulputate sem. Donec vel facilisis est. Morbi vitae mollis massa, sed maximus ex. Duis elit orci, scelerisque ut erat eu, tincidunt euismod erat.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed at ante vitae nulla vulputate elementum. Maecenas imperdiet malesuada lacinia. Donec sit amet aliquet urna. Nam sit amet eros dapibus, commodo ligula a, imperdiet mi. Fusce rhoncus eros in leo rutrum, at lobortis leo sodales. Quisque nibh tellus, rutrum placerat turpis ac, ullamcorper suscipit nisl. Nullam faucibus quam a leo imperdiet, vel blandit nibh iaculis. Duis efficitur ipsum eu eros fermentum, in volutpat erat tincidunt. Curabitur sit amet vulputate sem. Donec vel facilisis est. Morbi vitae mollis massa, sed maximus ex. Duis elit orci, scelerisque ut erat eu, tincidunt euismod erat.

Course Curriculum

  • 1

    Introduction

    • Welcome to the Course

  • 2

    Malware Concepts: Building a solid foundation upon which to learn

    • What is Malware?

    • Symptoms and Activities

    • Types of Malware

    • Infection Vectors

  • 3

    Malware Analysis: Foundational concepts before begin working with malware

    • Malware Analysis Overview and Types

    • Static Analysis

    • Dynamic Analysis

  • 4

    Setting Up the Analysis Environment (FlareVM)

    • Install Virtual Box

    • Install Windows 10 in Virtual Box

    • Installing FlareVM

    • InstallingFlareVMUsingPowershellonWindows10-1525305380034

    • Download Trickster.exe

    • Creating Snapshots and Isolating FlareVM

    • Disabling the Firewall and Antivirus

  • 5

    Conducting the Analysis

    • Attempting Static Analysis with Floss

    • Beginning Dynamic Analysis with Autoruns

    • Investigating the Scheduled Task

    • Packet Analysis with Wireshark and Process Monitoring

    • Files and Folders Created

    • Static Analysis with Ida and OllyDbg

    • Static Analysis with Process Dump

    • Open Source Research

  • 6

    Conclusion

    • Conclusion

About the instructor

What others have been saying about this course:

Use your Call To Action description to encourage students to sign up for your course

You may also be interested in...