Understand malware behavior and evade it using IDA Pro, OllyDbg, and WINDBG
About This Video
Master advanced malware analysis topics
Hands-on experience with popular analysis tools
Covers advanced topics on malware behavior and evasion
In Detail
In this video course, we cover advanced malware analysis topics. Towards this goal, we first understand the behavior of different classes of malware. Such knowledge helps us to easily categorize malware based on …
Advanced Malware Analysis
Video description
Understand malware behavior and evade it using IDA Pro, OllyDbg, and WINDBG
About This Video
Master advanced malware analysis topics
Hands-on experience with popular analysis tools
Covers advanced topics on malware behavior and evasion
In Detail
In this video course, we cover advanced malware analysis topics. Towards this goal, we first understand the behavior of different classes of malware. Such knowledge helps us to easily categorize malware based on its characteristic. We see how sophisticated malware can use techniques to either evade detection or increase its damage and access to the system.
Then we learn advanced techniques in static and dynamic malware analysis and cover the details and powerful features of OllyDbg, IDA Pro, and WINDBG. We also explore defense mechanisms against malware, create a signature for malware, and set up an intrusion detection system (IDS) to prevent attacks.
Finally, we cover the concept of packers and unpackers, and explore how to unpack packed malware to analyze it.
Audience
This video course provides security professionals, incident responders, and individuals with the information they need to perform a deep malware analysis. They will also learn how to detect, and defend against, malware.
Chapter 5 : How to Detect and Defend against Malware in a Network
Malware Detection Techniques
Steps to Clean a Compromised Network
How Intrusion Detection Systems Work
An Introduction to Snort
How to Setup Snort?
How to Create a Signature?
Why Hybrid Analysis?
Chapter 6 : How to Deal with Evasive Malware
How Do Packers Work?
How to Detect Packed Malware?
How to Unpack a Malware Program?
Examples of Unpacking a Malware Program
Start your Free Trial Self paced Go to the Course We have partnered with providers to bring you collection of courses, When you buy through links on our site, we may earn an affiliate commission from provider.
This site uses cookies. By continuing to use this website, you agree to their use.I Accept