Company: Pluralsight Author: Josh Stroschein Full Title: Analyzing Malware For .NET And Java Binaries Year: 2018 Language: English Genre: Educational: Security Skill Level: Intermediate Price: - - Files: MP4 (+ Slides PDF) Time: 01:42:00 Video: AVC, 1280 x 720 (1.778) at 30.000 fps, 450 kbps Audio: AAC at 74 Kbps, 2 channels, 44.1 KHz This course will teach the basics of Java and .NET runtimes, introduce tools and techniques for effectively reverse engineering these binary types, show you how to identify indicators of compromise, and get hands-on with real world malware.. The ability to quickly and effectively analyse a wide variety of malware is a critical skill for anyone performing incident response, working in a security operations center (SOC), or analyzing malware. In this course, Analyzing Malware for .NET and Java Binaries, you will gain the skills necessary to effectively analyze Java and .NET malware. First, you will learn how .NET and Java binaries differ from other malware. Next, you will learn the tools, techniques, and workflows necessary to reverse engineer these types of binaries. Finally, you will apply everything you learned through hands-on labs in which you will analyze real-world malware. When you are finished with this course, you will have the knowledge and skills necessary to analyze .NET and Java binaries, giving you the ability to effectively investigate a wider variety of malware. Lessons: Course Overview 01. Course Overview Introduction 02. Course Introduction 03. Why Analyze .NET and Java Malware 04. Module Introduction 05. Understanding the Difference Between Compiled and Interpreted Languages 06. Code Obfuscation Techniques 07. Conclusion Analyzing .NET Binaries 08. Introduction 09. Details of the .NET Framework 10. Understanding .NET Bytecode 11. Leveraging Tools to Reverse Engineer .NET Binaries 12. Tracing Program Behavior 13. DEMO: Applying What You Have Learned 14. Lab: Analyzing Your First .NET Binary 15. Conclusion Analyzing Java Binaries 16. Introduction 17. Details of the Java Runtime Environment 18. Understanding Java Bytecode 19. Leveraging Tools to Reverse Engineer Java Binaries 20. DEMO: Applying What You Have Learned 21. Lab: Analyzing Your First Java Binary 22. Conclusion Performing Real-world Analysis 23. Introduction 24. Analyzing .NET Ransomware 25. .NET Ransomware Lab 26. Analyzing a Java Remote Access Trojan (RAT) 27. Java Remote Access Trojan Lab 28. Conclusion Leveling up Your Skills 29. Introduction 30. What You Can Now Do 31. Next Steps 32. Conclusion Our members see more. Join us! ------------- Our members see more. Join us!