Home / Course catalog / Reverse Engineering & Malware Analysis Expert

Hacking

Reverse Engineering & Malware Analysis Expert


Content
  • 1. Course Introduction & Overview of Cyber Kill chain
  • 1. Introduction to Expert Malware Analysis and Reverse Engineering.mp4
  • 2. Detailed Course Overview.mp4
  • 3. System Requirements for the course.mp4
  • 4. Setting up your malware testing lab.mp4
  • 5. Setting up the tools in your malware lab.mp4
  • 6. Introduction to REMnux.mp4
  • 7. Introduction to Cyber Kill Chain.mp4
  • 2. Getting started with analyzing malicious Files
  • 1. Understanding Recon and Weaponization stages.mp4
  • 2. Spearphishing Emails as Delivery Mechanisms.mp4
  • 3. Analyzing Spearphishing emails and its headers.mp4
  • 4. Understanding Sender Policy Framework Protocol for Email Spam detection.mp4
  • 5. Understanding Microsoft Office File Format Structure.mp4
  • 6. Analyzing Malicious Office File Using Oledump - Part 1.mp4
  • 7. Analyzing Malicious Office File Using Oledump - Part 2.mp4
  • 8. Analyzing malicious OLE Files using Oletools - Part 1.mp4
  • 9. Analyzing malicious OLE Files using Oletools - Part 2.mp4
  • 10. Analyzing malicious OLE Files using Oletools - Part 3.mp4
  • 11. Understanding PDF file structure - Part 1.mp4
  • 12. Understanding PDF file structure - Part 2.mp4
  • 13. Analyzing Malicious PDF files - Part 1.mp4
  • 14. Analyzing Malicious PDF files - Part 2.mp4
  • 15. Analyzing Malicious PDF file using PDF Stream Dumper.mp4
  • 3. Network Based analysis and forensics
  • 1. Packet capture and analysis - Introduction.mp4
  • 2. Introduction to Wireshark and packet captures.mp4
  • 3. Working with Wireshark Display filters.mp4
  • 3.1 0303-Wireshark_Display_Filters.pdf.pdf
  • 4. Wireshark Packet capture and filter Demo.mp4
  • 5. Analyzing Exploit kits Through Wireshark - Part 1.mp4
  • 6. Analyzing Exploit kits Through Wireshark - Part 2.mp4
  • 7. Analyzing Exploit kit traffic in Pcap Demo.mp4
Completion rules
  • All units must be completed