Advanced Malware Analysis: Combating Exploit Kits
Pluralsight
Course Summary
Cyber-crime is rampant, and it's only getting worse. This hands-on course will show you how to analyze the most difficult cyber intrusions so that you can understand and better protect your data from exploit kits, an advanced form of malware.
-
+
Course Description
Cyber-criminals are innovating faster than ever, and the cyber-crime industry caused the loss of hundreds of billions of dollars last year across the US and Europe alone. In this course, Advanced Malware Analysis: Combating Exploit Kits, you'll learn the skills you need to pull apart and analyze exploit kits (an advanced form of malware) with Dr. DeMott. First, you'll explore the tools and techniques you'll be using as well as analyze events collected by Bromium micro-VMs. Next, you'll work on unraveling the exploit kits--figuring out which ones were used, what they look like, how to decrypt them, and how to detect them in "the wild." Finally, you'll learn how to conduct safe dynamic analysis of these exploit kits, detect CNC communication, and share your analyses so that these problems can be remedied. By the end of this course, you'll not only have a better understanding of what exploit kits are and how to detect them, but you'll be able to analyze how they work and report them so that your data is safer than ever from cyber-crime.
-
+
Course Syllabus
Course Overview- 1m 19s
—Course Overview 1m 19sIntroduction- 16m 15s
—Introduction to Malware 1m 32s
—Demo: Analyzing a Bromium Alert 8m 10s
—Security Tool Follow-up 5m 46s
—First Malware Analysis Lab 0m 45sRecognizing the Exploit Vector- 15m 19sUnraveling Exploit Obfuscation- 13m 15sCircumventing Exploit Kit Encryption- 11m 1sUnderstanding Moving Target Communications- 8m 16sDetecting Angler in the Wild- 9m 20sPerforming Safe Dynamic Analysis- 13m 8sAnalyzing Files Statically- 13m 3sReversing Malware with Debugging Tools- 18m 3sReversing Malware with IDA pro- 15m 38sCustomizing Reports: From Researchers to CISOs- 8m 43s